Developer Anarchy

The latest episode of Software Engineering Radio contains an interesting discussion about a project management technique known as Developer Anarchy. Fred George, the interviewee, defines anarchy as a group of people managing themselves, with few or no rules being imposed by higher levels of management. George describes how he first discovered this technique when working …

Daily stand-up meetings: A communications pattern and anti-pattern

The pattern I like the idea of holding a daily stand-up meeting. This involves a team coming together at the start of each day to provide brief status updates and discuss the challenges ahead. I see stand-ups as being particularly useful in helping to resolve issues that are blocking progress, such as in this fictional …

Investigating the Internet of Things: Part 1

This weekend I have been reading the IEEE Computer Society’s Computer magazine that was kindly offered as a free download via their Twitter feed: COMPUTER MAGAZINE: Reminder/Download the first digital edition of 2015 for free! http://t.co/I3xmEBeGuc — IEEE ComputerSociety (@ComputerSociety) January 23, 2015 Two articles in this publication particularly caught my attention: Firstly, Hal Berghel’s cases …

Process based ideas generation

Focus on processes, not technology This morning I was watching an inspirational video about the part Jeffrey Zeldman has played in shaping the web as we know it today. In the early days of the Internet, the life of a web developer was plagued by browsers that competed with each other by constantly releasing innovative yet proprietary features. Zeldman was instrumental in bringing about the widespread …

Create your own bug list

Over the Christmas holidays I have been reading the excellent book Conceptual Blockbusting: A guide to better ideas, by James L. Adams. The book begins by introducing several type of conceptual blocks, such as cultural conventions or restrictive thought patterns, that stifle creative problem solving, before going on to describe methods for busting through these barriers. …

How to disable your car’s firewall

The power and perils of OBD-II In 2010, the Centre for Automotive Embedded Systems Security demonstrated the devastating consequences that could arise should malicious attackers gain access to the on-board diagnostics port (OBD-II) that has been fitted to most vehicles since the mid 1990s. This collaborative group of academic researchers from the University of California San Diego and …