Agile Processes in Software Engineering and Extreme

Total Page:16

File Type:pdf, Size:1020Kb

Agile Processes in Software Engineering and Extreme Juan Garbajosa · Xiaofeng Wang Ademar Aguiar (Eds.) Agile Processes in Software Engineering and Extreme Programming LNBIP 314 19th International Conference, XP 2018 Porto, Portugal, May 21–25, 2018 Proceedings Lecture Notes in Business Information Processing 314 Series Editors Wil M. P. van der Aalst RWTH Aachen University, Aachen, Germany John Mylopoulos University of Trento, Trento, Italy Michael Rosemann Queensland University of Technology, Brisbane, QLD, Australia Michael J. Shaw University of Illinois, Urbana-Champaign, IL, USA Clemens Szyperski Microsoft Research, Redmond, WA, USA More information about this series at http://www.springer.com/series/7911 Juan Garbajosa • Xiaofeng Wang Ademar Aguiar (Eds.) Agile Processes in Software Engineering and Extreme Programming 19th International Conference, XP 2018 Porto, Portugal, May 21–25, 2018 Proceedings Editors Juan Garbajosa Ademar Aguiar Technical University of Madrid University of Porto Madrid, Madrid Porto Spain Portugal Xiaofeng Wang Free University of Bozen-Bolzano Bolzano Italy ISSN 1865-1348 ISSN 1865-1356 (electronic) Lecture Notes in Business Information Processing ISBN 978-3-319-91601-9 ISBN 978-3-319-91602-6 (eBook) https://doi.org/10.1007/978-3-319-91602-6 Library of Congress Control Number: 2018944291 © The Editor(s) (if applicable) and The Author(s) 2018. This book is an open access publication. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Printed on acid-free paper This Springer imprint is published by the registered company Springer International Publishing AG part of Springer Nature The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland Preface This volume contains the papers presented at XP 2018, the 19th International Con- ference on Agile Software Development, held during May 21–25, 2018, in Porto, Portugal. XP is the premier agile software development conference combining research and practice. It is a unique forum where agile researchers, academics, practitioners, thought leaders, coaches, and trainers get together to present and discuss their most recent innovations, research results, experiences, concerns, challenges, and trends. XP con- ferences have been pushing forward the successful evolution and adoption of agile by teams and organizations, not only in the software industry and academia, but also beyond. Whether you are new to agile or a seasoned agile practitioner, XP 2018 provided a playful and informal environment to learn and trigger discussions around its main theme – make, inspect, adapt. Submissions of unpublished high-quality research papers related to agile and lean software development were invited for the XP 2018 Research Papers Track. The submissions received addressed the full spectrum of agile software development, broadly on agile, on issues of concern to researchers and practitioners alike. Submis- sions based on empirical studies and including practitioners and academic collabora- tions were encouraged. We received 62 submissions for the track. After the first screening by the track chairs, 58 submissions were sent out for single-blinded peer reviews. Each submission received (on average) three reviews from the Program Committee members. The committee decided to accept 21 papers, which are included in these proceedings. The success of the XP 2018 conference and the Research Papers Track should be attributed to the passionate and hard work of many people. We greatly appreciate the contributions from everyone, especially the authors and presenters of all papers, the Program Committee members, the volunteers, and the sponsors. Last but not least, we would like to express our sincere thanks to the organizing team of XP 2018, for their great and constant support to us. April 2018 Juan Garbajosa Xiaofeng Wang Ademar Aguiar Organization Conference Chair Ademar Aguiar Universidade do Porto, Portugal Research Papers Co-chairs Juan Garbajosa Universidad Politécnica de Madrid, Spain Xiaofeng Wang Free University of Bozen-Bolzano, Italy Research Workshops Co-chairs Stefan Wagner University of Stuttgart, Germany Rashina Hoda The University of Auckland, New Zealand Research Posters Co-chairs Hugo Ferreira Universidade do Porto, Portugal Davide Taibi Free University of Bozen-Bolzano, Italy Doctoral Symposium Co-chairs Pekka Abrahamsson University of Jyväskylä, Finland Casper Lassenius Aalto University, Finland Industry and Practice Co-chairs Jan Coupette Codecentric, Germany Nils Wloka Codecentric, Germany Experience Reports Co-chairs Rebecca Wirfs-Brock Wirfs-Brock Associates, USA Joseph Yoder The Refactory, USA Agile in Education and Training Co-chairs Craig Anslow Victoria University of Wellington, New Zealand Robert Chatley Imperial College London/Develogical Ltd., UK VIII Organization Tools and Demos Co-chairs Seb Rose Cucumber Limited, UK Allegra Cooper IT CTO, The Vanguard Group, Inc., USA Tutorials and Workshops Co-chairs Alan O’Callaghan Emerald Hill Limited, UK Lachlan Heasman Independent, Australia Openspace Chair Charlie Poole Poole Consulting, USA Panels Chair Steven Fraser Innoxec, USA Media Design Chair Miguel Carvalhais Universidade do Porto, Portugal Communication Design Mafalda Marinho Freelancer, Portugal Rita Ribeiro Freelancer, Portugal Press and Media Sponsors Pam Hughes Agile Alliance, USA Sponsors Liaison Philip Brock Agile Alliance, USA Student Volunteers Co-chairs Diogo Amaral Universidade do Porto, Portugal André Lago Universidade do Porto, Portugal Local Arrangements Pedro Miguel Silva Universidade do Porto, Portugal Esperanza Jurado Sopeña Badajoz, Spain Jose Luis Gonzalez Sopeña Badajoz, Spain Organization IX Agile Portugal Liaison Filipe Correia Universidade do Porto, Portugal Catarina Reis IP Leiria, Portugal Agile Alliance Liaison Jutta Eckstein Independent, Germany Steering Committee Juan Garbajosa Universidad Politécnica de Madrid, Spain Casper Lassenius Aalto University, Finland Erik Lundh IngenjörsGlädje, Sweden Hubert Baumeister Technical University of Denmark, Denmark Jutta Eckstein Independent, Germany Michele Marchesi DMI - University of Cagliari, Italy Nils Wloka Codecentric, Germany Philip Brock Agile Alliance, USA Steven Fraser Innoxec, USA Seb Rose Cucumber Limited, UK Institutional Partners Universidade do Porto, Portugal ScaleUp Porto, Portugal Agile Portugal, Portugal Agile Alliance, USA Program Committee Pekka Abrahamsson University of Jyväskylä, Finland Hubert Baumeister Technical University of Denmark, Denmark Jan Bosch Chalmers University of Technology, Sweden François Coallier École de technologie supérieure, Canada Kieran Conboy National University of Galway, Ireland Steve Counsell Brunel University, UK Daniela Cruzes SINTEF, Norway Torgeir Dingsøyr Norwegian University of Science and Technology, Norway Christof Ebert Vector Consulting Services, Germany Hakan Erdogmus Carnegie Mellon University, USA Michael Felderer University of Innsbruck, Austria Brian Fitzgerald Lero - Irish Software Engineering Research Centre, Ireland Alfredo Goldman University of São Paulo, Brazil Tony Gorschek Blekinge Institute of Technology, Sweden X Organization Des Greer Queen’s University Belfast, UK Peggy Gregory University of Central Lancashire, UK Eduardo Guerra National Institute of Space Research, Brazil Rashina Hoda The University of Auckland, New Zealand Helena Holmström University of Malmo, Sweden Olsson Sami Hyrynsalmi Tampere University of Technology, Finland Andrea Janes Free University of Bolzano, Italy Fabio Kon University of São Paulo, Brazil Casper Lassenius Massachusetts Institute of Technology, USA Lech Madeyski Wroclaw University of Science and Technology, Poland Michele Marchesi DMI - University of Cagliari, Italy Sabrina Marczak PUCRS, Brazil Frank Maurer University of Calgary, Canada Claudia Melo University of Brasília, Brazil Tommi Mikkonen University of Helsinki, Finland Alok Mishra Atilim University, Turkey Nils Brede Moe SINTEF, Norway Juergen Muench Reutlingen University, Germany Daniel Méndez Technical University of Munich, Germany Fernández Maria Paasivaara
Recommended publications
  • Agile Methodologies and Extreme Programming Corso Di Laurea
    Agile Methodologies and EXtreme Programming Lecturer: Giuseppe Santucci (Some slides taken from slideshare.net) Outline • Development Methodologies • Agile Development (12 Key Practices) • Extreme Programming (XP) – How does it work ? 2 What is a SE Methodology? • A SE methodology is a rigorously defined process (or set of practices) for creating software – A set of rules you have to follow – A set of conventions the organization decides to follow – A systematical, engineered approach for organizing software projects 3 Agile Development Agile Manifesto “Our highest priority is to satisfy the customer through early and continuous delivery of valuable software“ [Manifesto for Agile] 5 The agile spirit • Incremental – Working software over comprehensive documentation • Cooperation – Customer collaboration over contract negotiation • Straightforward – Individuals and interactions over processes and tools • Adaptive – Responding to change over following a plan 6 Agile Methodologies • eXtreme Programming (XP) • Scrum • Crystal family of methodologies • Feature-Driven Development (FDD) • Adaptive Software Development (ASD) • Dynamic System Development Model (DSDM) • Agile Unified Process (AUP) 7 The XP inventor: Kent Beck • eXtreme Programming – The most prominent agile development methodology Kent Beck 8 The 12 Key Practices 1. Metaphor 2. The Planning Game 3. Test-Driven Development 4. Pair Programming 5. Refactoring 6. Simple Design 7. Collective Ownership 8. Continuous Integration 9. On-site Customer 10. Small Releases 11. 40-Hour Workweek
    [Show full text]
  • Access Control
    Security Engineering: A Guide to Building Dependable Distributed Systems CHAPTER 4 Access Control Going all the way back to early time-sharing systems, we systems people regarded the users, and any code they wrote, as the mortal enemies of us and each other. We were like the police force in a violent slum. —ROGER NEEDHAM Microsoft could have incorporated effective security measures as standard, but good sense prevailed. Security systems have a nasty habit of backfiring, and there is no doubt they would cause enormous problems. —RICK MAYBURY 4.1 Introduction Access control is the traditional center of gravity of computer security. It is where se- curity engineering meets computer science. Its function is to control which principals (persons, processes, machines, . .) have access to which resources in the sys- tem—which files they can read, which programs they can execute, how they share data with other principals, and so on. NOTE This chapter necessarily assumes more computer science background than previous chapters, but I try to keep it to a minimum. 51 Chapter 4: Access Controls Figure 4.1 Access controls at different levels in a system. Access control works at a number of levels, as shown in Figure 4.1, and described in the following: 1. The access control mechanisms, which the user sees at the application level, may express a very rich and complex security policy. A modern online busi- ness could assign staff to one of dozens of different roles, each of which could initiate some subset of several hundred possible transactions in the system. Some of these (such as credit card transactions with customers) might require online authorization from a third party while others (such as refunds) might require dual control.
    [Show full text]
  • Agile Practices in Commercial Saas Teams
    SAMINT-MILI 2036 Master’s Thesis 30 credits May 2020 Agile Practices in Commercial SaaS Teams A case study on the adoption of agile practices in non-software teams Bruno Petersen Master’s Programme in Industrial Management and Innovation Masterprogram i industriell ledning och innovation Abstract Agile Practices in Commercial SaaS Teams Bruno Petersen Faculty of Science and Technology Agile software development methods have seen great success in software Visiting address: Ångströmlaboratoriet teams. Research on the topic of adopting agile methods in development teams Lägerhyddsvägen 1 is extensive. In the literature key enabling factors are identified and numerous House 4, Level 0 benefits of agile ways of working are named. Less attention has been payed to Postal address: the non-software functions in software development organizations, though. Box 536 Moreover, little is known about how well the enabling factors and benefits for 751 21 Uppsala software teams translate to other teams in the organization. The goal of this Telephone: study is to evaluate what benefits agile methods provide to non-software teams, +46 (0)18 – 471 30 03 whether the enabling factors are similar and what the challenges and drawbacks Telefax: for adopting agile methods in commercial teams are. Using the case of the +46 (0)18 – 471 30 00 Swedish Software-as -a-Service company Funnel, which introduced agile Web page: practices into their commercial teams, these questions are tackled. The study http://www.teknik.uu.se/student-en/ finds that knowledge transfer and governance are core areas that need to be engaged in during the adoption process. With decisions being made more autonomously ensuring the exchange of relevant information is crucial.
    [Show full text]
  • Agile-Methodologies-And-Extreme
    Agile Development and Extreme Programming Rouhollah Rahmati & Sina Khankhajeh Department of Computer Engineering Sharif University of Technology Agenda • Development Methodologies • Agile Development • Extreme Programming (XP) • In Practise • Develop Your Own Methodology Development Methodologies What is a Methodology? • A methodology is a formalized process or set of practices for creating software • A set of rules you have to follow • A set of conventions the organization decides to follow • unlike method • which systematically details a given procedure or process • Software development methodology • framework acts as a basis for applying specific approaches to develop and maintain software The Waterfall Development Process The Waterfall Process • The traditional development process: Software Requirements Analysis Design Implementation • Or at worst … Testing maintenance • But this always ends up happening! Agile Development Agile Manifesto “Our highest priority is to satisfy the customer through early and continuous delivery of valuable software“ [Manifesto for Agile] principles underlie the Agile Manifesto • Welcome changing requirements, even late in development • Working software is delivered frequently (weeks rather than months) • Working software is the principal measure of progress • Close, daily co-operation between business people and developers principles underlie the Agile Manifesto (continued) • Face-to-face conversation is the best form of communication (co-location) • Projects are built around motivated individuals, who
    [Show full text]
  • The Timeboxing Process Model for Iterative Software Development
    The Timeboxing Process Model for Iterative Software Development Pankaj Jalote Department of Computer Science and Engineering Indian Institute of Technology Kanpur – 208016; India Aveejeet Palit, Priya Kurien Infosys Technologies Limited Electronics City Bangalore – 561 229; India Contact: [email protected] ABSTRACT In today’s business where speed is of essence, an iterative development approach that allows the functionality to be delivered in parts has become a necessity and an effective way to manage risks. In an iterative process, the development of a software system is done in increments, each increment forming of an iteration and resulting in a working system. A common iterative approach is to decide what should be developed in an iteration and then plan the iteration accordingly. A somewhat different iterative is approach is to time box different iterations. In this approach, the length of an iteration is fixed and what should be developed in an iteration is adjusted to fit the time box. Generally, the time boxed iterations are executed in sequence, with some overlap where feasible. In this paper we propose the timeboxing process model that takes the concept of time boxed iterations further by adding pipelining concepts to it for permitting overlapped execution of different iterations. In the timeboxing process model, each time boxed iteration is divided into equal length stages, each stage having a defined function and resulting in a clear work product that is handed over to the next stage. With this division into stages, pipelining concepts are employed to have multiple time boxes executing concurrently, leading to a reduction in the delivery time for product releases.
    [Show full text]
  • Agile Software Development and Im- Plementation of Scrumban
    Joachim Grotenfelt Agile Software Development and Im- plementation of Scrumban Metropolia University of Applied Sciences Bachelor of Engineering Mobile Solutions Bachelor’s Thesis 30 May 2021 Abstrakt Författare Joachim Grotenfelt Titel Agile software utveckling och Implementation av Scrumban Antal Sidor 31 sidor Datum 30.05.2021 Grad Igenjör YH Utbildningsprogram Mobile Solutions Huvudämne Informations- och kommunikationsteknologi Instruktörer Mikael Lindblad, Projektledare Peter Hjort, Lektor Målet med avhandlingen var att studera agila metoder, hur de används i mjukvaruföretag och hur de påverkar arbetet i ett programvaruutvecklingsteam. Ett annat mål med avhandlingen var att studera bakgrunden till den agila metoden, hur den togs i bruk och hur den påverkar kundnöjdhet. I denna avhandling förklaras några existerande agila metoder, verktygen för hur agila metoder används, samt hur de påverkar programvaruutvecklingsteamet. Avhandlingen fokuserar sig på två agila metoder, Scrum och Kanban, eftersom de ofta används i olika företag. Ett av syftena med denna avhandling var att skapa förståelse för hur Scrumban metoden tas i bruk. Detta projekt granskar fördelarna med att ha ett mjukvaruutvecklingsteam som arbetar med agila processer. Projektet lyckades bra och en arbetsmiljö som använder agila metoder skapades. Fördelen blev att utvecklarteamet kunde göra förändringar när sådana behövdes. Nyckelord Agile, Scrum, Kanban, Scrumban Abstract Joachim Grotenfelt Author Basics of Agile Software Development and Implementation of Title Scrumban Number of Pages 31 pages Date 30.05.2021 Degree Bachelor of Engineering Degree Program Mobile Solutions Professional Major Information- and Communications Technology Instructors Mikael Lindblad, Project Manager Peter Hjort, Senior Lecturer The goal of the thesis is to study the Agile methods and how they affect the work of a soft- ware development team.
    [Show full text]
  • Extreme Programming Considered Harmful for Reliable Software Development
    AVOCA GmbH Extreme Programming Considered Harmful for Reliable Software Development Status: Approved Author(s): Gerold Keefer Version: 1.0 Last change: 06.02.02 21:17 Project phase: Implementation Document file name: ExtremeProgramming.doc Approval Authority: Gerold Keefer Distribution: Public Security Classification: None Number of pages: 1 Extreme Programming Considered Harmful for Reliable Software Development AVOCA GmbH 1 MOTIVATION ................................................................................................................................... 3 2BIAS................................................................................................................................................. 4 3 BENEFITS ........................................................................................................................................ 4 4 DUBIOUS VALUES AND PRACTICES........................................................................................... 5 5 C3 REVISITED ................................................................................................................................. 7 6 MISSING ANSWERS ....................................................................................................................... 7 7 ALTERNATIVES .............................................................................................................................. 8 8 CONCLUSIONS ............................................................................................................................
    [Show full text]
  • 9<HTOFPA=Hjdjfd>
    34 Computer Science Springer News 6/2008 springer.com/booksellers P. Abrahamsson, VTT, Finland; R. Baskerville, W. Abramowicz, Poznan University of Economics, R. Adams, Nanaimo, BC, Canada; S. Gibson, Georgia State University, Atlanta, GA, USA; Poznan, Poland; D. Fensel, STI Innsbruck, Austria University of Victoria, VIC, Canada; S. Müller Arisona, K. Conboy, Lero, NUI Galway, Ireland; B. Fitzgerald, (Eds.) University of California, Santa Barbara, CA, USA (Eds.) L. Morgan, X. Wang, Lero, University of Limerick, Ireland (Eds.) Business Information Systems Transdisciplinary Digital Art. Agile Processes in Software 11th International Conference, Sound, Vision and the New BIS 2008, Innsbruck, Austria, Screen Engineering and Extreme May 5–7, 2008, Proceedings Programming Digital Art Weeks and Interactive Futures 2006/2007, Zürich, Switzerland and Victoria, 9th International Conference, XP 2008, BC, Canada, Selected Papers Limerick, Ireland, June 11–14, 2008, This book contains the refereed proceedings of the 11th International Conference on Business Proceedings Information Systems, BIS 2008, held in Innsbruck, Austria, in May 2008. This volume collects selected papers from the The 41 revised full papers were carefully reviewed past two instances of Digital Art Weeks (Zurich, This book constitutes the refereed proceedings and selected inclusion in the book. The contri- Switzerland) and Interactive Futures (Victoria, BC, of the 8th International Conference on Agile butions cover research trends as well as current Canada), two parallel festivals of digital media art. Processes in Software Engineering and eXtreme achievements and cutting edge developments in The work represented in Transdisciplinary Digital Programming, XP 2008, held in Limerick, Ireland, the area of modern business information systems. Art is a confirmation of the vitality and breadth in June 2008.
    [Show full text]
  • Balloons Could Outperform Spacecraft by Surfing the Stratosphere. We Go
    AVIATION WORKFORCE 40 SPACE POWER 34 ROBOTICS 12 Attract the best and brightest Meet ROSA, the Roll Out Solar Array The case for telepresence at Mars Satellite envy Balloons could outperform spacecraft by surfi ng the stratosphere. We go deep on one company’s plan. PAGE 24 OCTOBER 2017 | A publication of the American Institute of Aeronautics and Astronautics | aerospaceamerica.aiaa.org CALL FOR TECHNICAL BRIEFINGS The AIAA Defense and Security Forum (AIAA DEFENSE 2018) brings together the contractor, acquisition, and R&D communities for classifi ed and unclassifi ed discussions of critical technical, programmatic, and policy topics in a SECRET/NoFORN unbiased, nonpartisan environment. Nearly 200 experts will present the latest innovative technological breakthroughs that will integrate with current and next-generation defense systems. Advanced Prototypes Aerospace and Defense Computing Systems Countermeasures Directed Energy Weapons Estimation, Guidance, Navigation and Control Hypersonic Systems and Technologies Innovative Concepts and Technologies Missile Defense Robotic and Unmanned Weapon Systems Space Systems Strategic Missile Systems – Ground Based Strategic Missile Systems – Sea Based Deterrent Survivability Systems and Decision Analysis for National Security Tactical Missiles Weapon System Performance Analysis, Modeling and Simulation Weapon System Test and Evaluation Abstract Deadline: 30 November 2017 FEATURES | October 2017 MORE AT aerospaceamerica.aiaa.org 16 34 24 Ka-boom! Unrolling innovation Stratosphere surfi ng How a mission to smash a spacecraft Meet the solar array that could One company says its balloons can do into a moonlet may help defend Earth disrupt the spacecraft market. from asteroids and comets. what conventional satellites can do, By Debra Werner and then some.
    [Show full text]
  • Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian
    Northwestern Journal of Technology and Intellectual Property Volume 6 Article 3 Issue 1 Fall Fall 2007 Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Recommended Citation Christopher Soghoian, Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them, 6 Nw. J. Tech. & Intell. Prop. 46 (2007). https://scholarlycommons.law.northwestern.edu/njtip/vol6/iss1/3 This Article is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Fall 2007 VOL. 6, NO. 1 © 2007 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Copyright 2007 by Northwestern University School of Law Volume 6, Number 1 (Fall 2007) Northwestern Journal of Technology and Intellectual Property Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them By Christopher Soghoian* I. INTRODUCTION ¶1 This paper focuses on the subsidization of a technology-based durable good.1 It goes on to discuss the delicate dance between the producer trying to protect its profit, competitors trying to create and sell aftermarket goods,2 and those innovative customers who use the items in completely unplanned and unprofitable ways. ¶2 An age old, but increasingly popular business model involves the subsidization of a proprietary durable good by a manufacturer, such that the good is sold below cost.3 Due to careful design, technological, and legal restrictions, the producer creates a primary product that is only compatible with its own aftermarket goods.
    [Show full text]
  • The Basic Economics of Internet Infrastructure
    Journal of Economic Perspectives—Volume 34, Number 2—Spring 2020—Pages 192–214 The Basic Economics of Internet Infrastructure Shane Greenstein his internet barely existed in a commercial sense 25 years ago. In the mid- 1990s, when the data packets travelled to users over dial-up, the main internet T traffic consisted of email, file transfer, and a few web applications. For such content, users typically could tolerate delays. Of course, the internet today is a vast and interconnected system of software applications and computing devices, which society uses to exchange information and services to support business, shopping, and leisure. Not only does data traffic for streaming, video, and gaming applications comprise the majority of traffic for internet service providers and reach users primarily through broadband lines, but typically those users would not tolerate delays in these applica- tions (for usage statistics, see Nevo, Turner, and Williams 2016; McManus et al. 2018; Huston 2017). In recent years, the rise of smartphones and Wi-Fi access has supported growth of an enormous range of new businesses in the “sharing economy” (like, Uber, Lyft, and Airbnb), in mobile information services (like, social media, ticketing, and messaging), and in many other applications. More than 80 percent of US households own at least one smartphone, rising from virtually zero in 2007 (available at the Pew Research Center 2019 Mobile Fact Sheet). More than 86 percent of homes with access to broadband internet employ some form of Wi-Fi for accessing applications (Internet and Television Association 2018). It seems likely that standard procedures for GDP accounting underestimate the output of the internet, including the output affiliated with “free” goods and the restructuring of economic activity wrought by changes in the composition of firms who use advertising (for discussion, see Nakamura, Samuels, and Soloveichik ■ Shane Greenstein is the Martin Marshall Professor of Business Administration, Harvard Business School, Boston, Massachusetts.
    [Show full text]
  • Using CMMI Together with Agile Software Development
    Information and Software Technology 58 (2015) 20–43 Contents lists available at ScienceDirect Information and Software Technology journal homepage: www.elsevier.com/locate/infsof Using CMMI together with agile software development: A systematic review ⇑ Fernando Selleri Silva a,b, , Felipe Santana Furtado Soares a,c, Angela Lima Peres a,d, Ivanildo Monteiro de Azevedo a,b, Ana Paula L.F. Vasconcelos a,b, Fernando Kenji Kamei a,e, Silvio Romero de Lemos Meira a,c a Center of Informatics (CIn), Federal University of Pernambuco (UFPE), Recife, PE, Brazil b Computer Science Course (FACET), Mato Grosso State University (UNEMAT), Barra do Bugres, MT, Brazil c Recife Center of Advanced Studies and Systems (C.E.S.A.R), Recife, PE, Brazil d Cesmac University Center, Maceió, AL, Brazil e Federal Institute of Alagoas (IFAL), Arapiraca, AL, Brazil article info abstract Article history: Background: The search for adherence to maturity levels by using lightweight processes that require low Received 18 April 2014 levels of effort is regarded as a challenge for software development organizations. Received in revised form 21 August 2014 Objective: This study seeks to evaluate, synthesize, and present results on the use of the Capability Matu- Accepted 27 September 2014 rity Model Integration (CMMI) in combination with agile software development, and thereafter to give an Available online 6 October 2014 overview of the topics researched, which includes a discussion of their benefits and limitations, the strength of the findings, and the implications for research and practice. Keywords: Methods: The method applied was a Systematic Literature Review on studies published up to (and Software process improvement including) 2011.
    [Show full text]