SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Agile Capacity Management
Dale Feiste, Principal Consultant
Abstract
Waterfall and agile processes have been applied to software development for many years.
However, the same concepts can be applied to many other areas of business operation,
including general IT activities such as capacity management. Terms such as lean, scrum, sprint,
velocity, stories, etc. are used in agile development, and can be carried over into other areas
as well, where they fit. Where agile concepts do not fit well, a more conventional or hybrid
approach can be used. Underlying principles to improve efficiency is what should determine
the methods used.
Agile software development was formulated in 2001 by a group of developers who created
a manifesto based on their experience with software development. The manifesto contained
guiding principles the developers came to value in creating software. Mapping these concepts
over to other areas of business operation, where efficiency could be improved, was a natural
evolution. Primary factors for agile processes is that it be customer centric and fast. This paper
covers the idea of applying agile processes to the function of capacity management and real
experiences carrying out capacity management in a company that has embraced Scaled Agile
methodologies.
2Syncsort Confidential and Proprietary - do not copy or distribute
Contents
Agile processes from the beginning
Capacity management requirements
Mapping agile processes and executing them
Lessons learned
Future ideas
3Syncsort Confidential and Proprietary - do not copy or distribute
Agile processes from the beginning
Agile processes respond to
unpredictability through incremental,
iterative workflows and empirical
feedback. Agile processes can be an
alternative to waterfall, or traditional
sequential processes.
It advocates adaptive planning,
evolutionary creation, early
implementation, and continuous
improvement, and it encourages
rapid and flexible response to change.
4Syncsort Confidential and Proprietary - do not copy or distribute
Agile processes from the beginning
Agile methodologies provides opportunity
to assess the direction of value delivery
throughout the creation lifecycle.
Progress is achieved through periodic
iteration of work, known as sprints, at the
end of which team present a potentially
shippable functionality.
By focusing on repetition of abbreviated
work cycles, as well as functional output
produced, agile methodology can be
described as “iterative” and
“incremental.”
5Syncsort Confidential and Proprietary - do not copy or distribute
Agile processes from the beginning
A primary difference between agile methods and
other approaches, is that quality and value is
measured immediately after changes are made.
Because this happens in iterations, users of the
output can frequently use the new functionality
to validate value. After users know the real value
of the updated functionality, better decisions can
be made about what should be delivered in the
future.
Having retrospective sessions in each iteration,
Scrum typically has iterations of just two weeks,
helps the team continuously adapt its plans to
maximize the value it delivers.
6Syncsort Confidential and Proprietary - do not copy or distribute
Capacity management requirements
Mission
Ensuring the best use of the appropriate IT infrastructure to cost-
effectively meet the business needs both now and in the future
Understanding how IT services will be used and matching resources
to deliver services at agreed levels (SLAs) now and in the future
Syncsort Confidential and Proprietary - do not copy or distribute 7
Capacity management requirements
Key Task
Ensuring adequate capacity
Performance Monitoring
Tuning
Forecasting resource demands and service levels
Producing the Capacity Plan
8Syncsort Confidential and Proprietary - do not copy or distribute
Capacity management requirements
Objects
Ensure the right level of ITI investment
Identify and resolve bottlenecks
Evaluate tuning strategies
Improve and report/publish performance
“Right-size” or “consolidate”
Ensure accurate and timely procurements
Ensure effective service level management
Plan for workload growth, new apps / sites
Avoid performance disasters
9Syncsort Confidential and Proprietary - do not copy or distribute
Inputs OutputsSub-Process
Business
Service
Component
Technology
SLAs
Business Plans
Operations
Budgets…
Capacity Plan
SLA guidelines
Thresholds
Charging
Audits…
Inputs and Outputs
Capacity management requirements
10Syncsort Confidential and Proprietary - do not copy or distribute
Capacity management requirements
Inputs
Technology
SLAs, SLRs, and Service Catalogue
IT Plans and Strategy
Business Requirements and
Volumes
Operational Schedules
Deployment and Development
Plans
Forward Schedule of Changes
(Change Management)
11Syncsort Confidential and Proprietary - do not copy or distribute
Incidents and Problems
(Incident Management
and Change Management)
Service Reviews
SLA Breaches
Financial Plans
Budgets
Capacity management requirements
Outputs
Capacity Plan
Capacity Management Information System (CMIS)
Baselines and Profiles
Thresholds and Alarms
Capacity Reports (regular, ad-hoc, exception)
SLA and SLR recommendations
Costing and charging recommendations
Proactive changes and service improvements
Revised operational schedule
Effectiveness reviews
Audits
12Syncsort Confidential and Proprietary - do not copy or distribute
Activities
Business
Service
Component
Capacity
Plan
Capacity Management
Information System (CMIS)
Demand
Management
Modeling
Application
Sizing
Monitor
Analyze
Tune
Implement
Capacity management requirements
13Syncsort Confidential and Proprietary - do not copy or distribute
Service BusinessComponent
ServerUtilization
NetworkUtilization
ApplicationUsage
ServiceResponse
Transaction
volumes
ServiceLevel
Agreements
Businessforecasts
Businessstrategy
Facilities
Application Layer
Reporting
Service
Thresholds
Metric
Correlation
Analysis Tuning
Recommendations
Modeling
Planning
Capacity management information system (CMIS)
14Syncsort Confidential and Proprietary - do not copy or distribute
Waterfall Methodology ->
http://www.innovapptive.com/blog/wp-content/uploads/2013/10/agile_scrum_methodology.jpg
Mapping agile processes and executing them
15Syncsort Confidential and Proprietary - do not copy or distribute
Mapping agile processes and executing them
Scrum Roles
Product Owner
Scrum Master
Development Team
Scrum Activities and Artifacts
Product Backlog
Sprints
Sprint Planning
Sprint Execution
Daily Scrum
Sprint Review
Sprint Retrospective
16Syncsort Confidential and Proprietary - do not copy or distribute
 Scrum Storyboard
Scrum Burndown Chart 
Mapping agile processes and executing them
17Syncsort Confidential and Proprietary - do not copy or distribute
• Capacity Assurance
• Monitoring
• Tuning
• Forecasting
• Capacity Plans
Completing capacity management tasks with agile methodology follows the same
process as with other work, such as software development.
Product Backlog
Stories
• Capacity Plans
• CMIS
• Baselines
• Alarms
• Reports
• SLAs
• Recommendations
• Improvements
• Schedules
• Reviews
• Audits
Output
Mapping agile processes and executing them
18Syncsort Confidential and Proprietary - do not copy or distribute
http://www.scaledagileframework.com
Mapping agile processes and executing them - Scaled Agile
What is “Scaled Agile”?
Scaled Agile Framework (or SAFe) is an agile software development framework consisting of a
knowledge-base of integrated patterns intended for enterprise-scale Lean-Agile development.
Its proponents consider SAFe to be scalable and modular, allowing an organization to apply it
in a way that suits its need, including non-development areas like capacity management.
Before realizing SAFe rewards, organizations must embrace a Lean-Agile mindset, and
understand and apply Lean-Agile principles.
Achieving the business benefits of Lean-Agile processes at scale is not a trivial effort, and SAFe
is not a trivial framework.
19Syncsort Confidential and Proprietary - do not copy or distribute
Mapping agile processes and executing them - Scaled Agile
The Transition to Scaled Agile Framework
Went from project-driven to product-driven. Capacity Planning team merged with IT Facilities
and Monitoring to become Facilities, Capacity, Monitoring Service.
Infrastructure became service-oriented (Server, Storage, Middleware). No longer
Engineering/Operations split.
Essentially all of traditional IT switched to the Scaled Agile Framework (SAFe) as our new way
of working.
Individual Service/Product teams are using SCRUM or Kanban to track work.
Adoption rates vary across the organization.
20Syncsort Confidential and Proprietary - do not copy or distribute
Mapping agile processes and executing them - Scaled Agile
21Syncsort Confidential and Proprietary - do not copy or distribute
Lessons learned
Unplanned work.
Areas of the organization that are not using same methodology or iteration/sprint schedule
Data Centers/Power Infrastructure may not always be “agile”
Huge backlog
Silos can get worse
In something like Scrum/SAFe, the ceremonies and formalities might seem heavy and killing
efficiency.
22Syncsort Confidential and Proprietary - do not copy or distribute
Lessons learned
Rapidly changing capacity requirements or lack thereof
Planning away the ability to be curious
Cadence of short sprints and capacity reporting work well together
More visibility into what we provide the business
Learning/Training – plan, show the value, do
Better teamwork
Less trying to predict resource needs from waterfall style development and delivery
Watch out for your company being sold “agile as a product” and not doing things how it
works best for your organization.
23Syncsort Confidential and Proprietary - do not copy or distribute
Future ideas
Timeframes rarely allow for a large, all-encompassing enterprise plan
Plans live through ongoing/incremental work items
Respond to change
24Syncsort Confidential and Proprietary - do not copy or distribute
Future ideas
Still need long-term data; unless you don’t
The plan and results achieved are much more visible
Any formal plans need to be kept much more simple, as things are changing much
more rapidly
25Syncsort Confidential and Proprietary - do not copy or distribute
Thank you for attending
Agile Capacity Management
Questions or comments?

Más contenido relacionado

La actualidad más candente

Rick Austin - Portfolio mangement in an agile world [Agile DC]
Rick Austin - Portfolio mangement in an agile world [Agile DC]Rick Austin - Portfolio mangement in an agile world [Agile DC]
Rick Austin - Portfolio mangement in an agile world [Agile DC]LeadingAgile
 
Hands-on Agile Webinar #2: Agile Maturity & Agility Assessment
Hands-on Agile Webinar #2: Agile Maturity & Agility AssessmentHands-on Agile Webinar #2: Agile Maturity & Agility Assessment
Hands-on Agile Webinar #2: Agile Maturity & Agility AssessmentStefan Wolpers
 
Introduction to SAFe, the Scaled Agile Framework
Introduction to SAFe, the Scaled Agile FrameworkIntroduction to SAFe, the Scaled Agile Framework
Introduction to SAFe, the Scaled Agile Frameworksrondal
 
SAFe® PI Planning - 4 locations - but how?
SAFe® PI Planning - 4 locations - but how?SAFe® PI Planning - 4 locations - but how?
SAFe® PI Planning - 4 locations - but how?Silvio Wandfluh
 
Exploring Agile Transformation and Scaling Patterns
Exploring Agile Transformation and Scaling PatternsExploring Agile Transformation and Scaling Patterns
Exploring Agile Transformation and Scaling PatternsMike Cottmeyer
 
Agile Estimation & Capacity Planning
Agile Estimation & Capacity PlanningAgile Estimation & Capacity Planning
Agile Estimation & Capacity PlanningMazhar Khan
 
Scaled agile framework (SAFe) - adopting agile at enterprise scale
Scaled agile framework (SAFe) - adopting agile at enterprise scaleScaled agile framework (SAFe) - adopting agile at enterprise scale
Scaled agile framework (SAFe) - adopting agile at enterprise scaleVadim Mikhnevych
 
Building Your SAFe Implementation Strategy
Building Your SAFe Implementation StrategyBuilding Your SAFe Implementation Strategy
Building Your SAFe Implementation StrategyAlex Yakyma
 
Strategies for Large Scale Agile Transformation
Strategies for Large Scale Agile TransformationStrategies for Large Scale Agile Transformation
Strategies for Large Scale Agile TransformationNishanth K Hydru
 
SFA2018 Project to Product - Carmen DeArdo
SFA2018 Project to Product - Carmen DeArdoSFA2018 Project to Product - Carmen DeArdo
SFA2018 Project to Product - Carmen DeArdoCarmen DeArdo
 
How to do effective pi planning
How to do effective pi planningHow to do effective pi planning
How to do effective pi planningSwatiKapoor43
 
An Integral Agile Transformation Approach - Miljan Bajic
An Integral Agile Transformation Approach - Miljan BajicAn Integral Agile Transformation Approach - Miljan Bajic
An Integral Agile Transformation Approach - Miljan Bajicagilemaine
 
scaling-agile-spotify
 scaling-agile-spotify scaling-agile-spotify
scaling-agile-spotifyJohn Tian
 
Agile transformation Explanined
Agile transformation ExplaninedAgile transformation Explanined
Agile transformation ExplaninedLeadingAgile
 
Scaled Agile Framework
Scaled Agile FrameworkScaled Agile Framework
Scaled Agile FrameworkKnoldus Inc.
 
SAFe (Scaled Agile Framework) 5 mins overview - Roni Tamari
SAFe (Scaled Agile Framework) 5 mins overview - Roni TamariSAFe (Scaled Agile Framework) 5 mins overview - Roni Tamari
SAFe (Scaled Agile Framework) 5 mins overview - Roni TamariAgileSparks
 
11 GEEKBOOKS PI Planning Briefings (5.1).pdf
11 GEEKBOOKS PI Planning Briefings (5.1).pdf11 GEEKBOOKS PI Planning Briefings (5.1).pdf
11 GEEKBOOKS PI Planning Briefings (5.1).pdfVinayKumar882579
 
Agile Transformation v1.27
Agile Transformation v1.27Agile Transformation v1.27
Agile Transformation v1.27LeadingAgile
 

La actualidad más candente (20)

Rick Austin - Portfolio mangement in an agile world [Agile DC]
Rick Austin - Portfolio mangement in an agile world [Agile DC]Rick Austin - Portfolio mangement in an agile world [Agile DC]
Rick Austin - Portfolio mangement in an agile world [Agile DC]
 
Hands-on Agile Webinar #2: Agile Maturity & Agility Assessment
Hands-on Agile Webinar #2: Agile Maturity & Agility AssessmentHands-on Agile Webinar #2: Agile Maturity & Agility Assessment
Hands-on Agile Webinar #2: Agile Maturity & Agility Assessment
 
Introduction to SAFe, the Scaled Agile Framework
Introduction to SAFe, the Scaled Agile FrameworkIntroduction to SAFe, the Scaled Agile Framework
Introduction to SAFe, the Scaled Agile Framework
 
SAFe® PI Planning - 4 locations - but how?
SAFe® PI Planning - 4 locations - but how?SAFe® PI Planning - 4 locations - but how?
SAFe® PI Planning - 4 locations - but how?
 
Exploring Agile Transformation and Scaling Patterns
Exploring Agile Transformation and Scaling PatternsExploring Agile Transformation and Scaling Patterns
Exploring Agile Transformation and Scaling Patterns
 
Agile Estimation & Capacity Planning
Agile Estimation & Capacity PlanningAgile Estimation & Capacity Planning
Agile Estimation & Capacity Planning
 
Scaled agile framework (SAFe) - adopting agile at enterprise scale
Scaled agile framework (SAFe) - adopting agile at enterprise scaleScaled agile framework (SAFe) - adopting agile at enterprise scale
Scaled agile framework (SAFe) - adopting agile at enterprise scale
 
Building Your SAFe Implementation Strategy
Building Your SAFe Implementation StrategyBuilding Your SAFe Implementation Strategy
Building Your SAFe Implementation Strategy
 
Strategies for Large Scale Agile Transformation
Strategies for Large Scale Agile TransformationStrategies for Large Scale Agile Transformation
Strategies for Large Scale Agile Transformation
 
SFA2018 Project to Product - Carmen DeArdo
SFA2018 Project to Product - Carmen DeArdoSFA2018 Project to Product - Carmen DeArdo
SFA2018 Project to Product - Carmen DeArdo
 
How to do effective pi planning
How to do effective pi planningHow to do effective pi planning
How to do effective pi planning
 
An Integral Agile Transformation Approach - Miljan Bajic
An Integral Agile Transformation Approach - Miljan BajicAn Integral Agile Transformation Approach - Miljan Bajic
An Integral Agile Transformation Approach - Miljan Bajic
 
scaling-agile-spotify
 scaling-agile-spotify scaling-agile-spotify
scaling-agile-spotify
 
Agile Transformation Journey on Large Scale Projects
Agile Transformation Journey on Large Scale ProjectsAgile Transformation Journey on Large Scale Projects
Agile Transformation Journey on Large Scale Projects
 
Agile transformation Explanined
Agile transformation ExplaninedAgile transformation Explanined
Agile transformation Explanined
 
Scaled Agile Framework
Scaled Agile FrameworkScaled Agile Framework
Scaled Agile Framework
 
SAFe (Scaled Agile Framework) 5 mins overview - Roni Tamari
SAFe (Scaled Agile Framework) 5 mins overview - Roni TamariSAFe (Scaled Agile Framework) 5 mins overview - Roni Tamari
SAFe (Scaled Agile Framework) 5 mins overview - Roni Tamari
 
Agile transformation by Gnanasambandham anbazhagan
Agile transformation   by Gnanasambandham anbazhaganAgile transformation   by Gnanasambandham anbazhagan
Agile transformation by Gnanasambandham anbazhagan
 
11 GEEKBOOKS PI Planning Briefings (5.1).pdf
11 GEEKBOOKS PI Planning Briefings (5.1).pdf11 GEEKBOOKS PI Planning Briefings (5.1).pdf
11 GEEKBOOKS PI Planning Briefings (5.1).pdf
 
Agile Transformation v1.27
Agile Transformation v1.27Agile Transformation v1.27
Agile Transformation v1.27
 

Similar a Agile Capacity Management

CONIG® v1.5 Converged Information Governance
CONIG® v1.5 Converged Information GovernanceCONIG® v1.5 Converged Information Governance
CONIG® v1.5 Converged Information GovernanceYalcin Gerek
 
Conig® v1.5 Converged Information Governance
Conig® v1.5 Converged Information GovernanceConig® v1.5 Converged Information Governance
Conig® v1.5 Converged Information GovernanceYalcin Gerek
 
Agile = scrum = no Project Managers!
Agile = scrum = no Project Managers!Agile = scrum = no Project Managers!
Agile = scrum = no Project Managers!Darren Wilmshurst
 
Agile methodology Interview Question Document File
Agile methodology Interview Question Document FileAgile methodology Interview Question Document File
Agile methodology Interview Question Document FileDilipPinto4
 
Innovate agl 1601-case-study-rtc-sa-fe
Innovate agl 1601-case-study-rtc-sa-feInnovate agl 1601-case-study-rtc-sa-fe
Innovate agl 1601-case-study-rtc-sa-febluemercury
 
Scaled Agile Framework
Scaled Agile FrameworkScaled Agile Framework
Scaled Agile FrameworkXPDays
 
Sap Implementation Presentation
Sap Implementation PresentationSap Implementation Presentation
Sap Implementation Presentationlarrymcc
 
Shawn Carlson Enterprise Transformation Leader CV
Shawn Carlson Enterprise Transformation Leader CVShawn Carlson Enterprise Transformation Leader CV
Shawn Carlson Enterprise Transformation Leader CVShawn Carlson
 
Integrated Enterprise PPM, ALM and APM on force.com cloud
Integrated Enterprise PPM, ALM and APM on force.com cloudIntegrated Enterprise PPM, ALM and APM on force.com cloud
Integrated Enterprise PPM, ALM and APM on force.com cloudPoornima N
 
Principle 11 needs to go! by Ken France at #AgileIndia2019
Principle 11 needs to go! by Ken France at #AgileIndia2019Principle 11 needs to go! by Ken France at #AgileIndia2019
Principle 11 needs to go! by Ken France at #AgileIndia2019Agile India
 
A Practical Guide to Scaling Agile
A Practical Guide to Scaling AgileA Practical Guide to Scaling Agile
A Practical Guide to Scaling AgileMariya Breyter
 
The Myriad faces of Agile Training & Certification
The Myriad faces of Agile Training & CertificationThe Myriad faces of Agile Training & Certification
The Myriad faces of Agile Training & CertificationSunil Mohal
 
Managing Hard Times With Quality & Project Management
Managing Hard Times With Quality & Project ManagementManaging Hard Times With Quality & Project Management
Managing Hard Times With Quality & Project ManagementHaroon Abbu
 
Solit 2014, Agile ValueTeam, учимся понимать Scrum, Семенченко Антон
Solit 2014, Agile ValueTeam, учимся понимать Scrum, Семенченко АнтонSolit 2014, Agile ValueTeam, учимся понимать Scrum, Семенченко Антон
Solit 2014, Agile ValueTeam, учимся понимать Scrum, Семенченко Антонsolit
 

Similar a Agile Capacity Management (20)

Agile at scale
Agile at scaleAgile at scale
Agile at scale
 
CONIG® v1.5 Converged Information Governance
CONIG® v1.5 Converged Information GovernanceCONIG® v1.5 Converged Information Governance
CONIG® v1.5 Converged Information Governance
 
Conig® v1.5 Converged Information Governance
Conig® v1.5 Converged Information GovernanceConig® v1.5 Converged Information Governance
Conig® v1.5 Converged Information Governance
 
Michigan Agile Presentation
Michigan Agile PresentationMichigan Agile Presentation
Michigan Agile Presentation
 
Agile = scrum = no project managers
Agile =  scrum =  no project managersAgile =  scrum =  no project managers
Agile = scrum = no project managers
 
Agile = scrum = no Project Managers!
Agile = scrum = no Project Managers!Agile = scrum = no Project Managers!
Agile = scrum = no Project Managers!
 
Agile methodology Interview Question Document File
Agile methodology Interview Question Document FileAgile methodology Interview Question Document File
Agile methodology Interview Question Document File
 
Innovate agl 1601-case-study-rtc-sa-fe
Innovate agl 1601-case-study-rtc-sa-feInnovate agl 1601-case-study-rtc-sa-fe
Innovate agl 1601-case-study-rtc-sa-fe
 
Scaled Agile Framework
Scaled Agile FrameworkScaled Agile Framework
Scaled Agile Framework
 
Sap Implementation Presentation
Sap Implementation PresentationSap Implementation Presentation
Sap Implementation Presentation
 
Innovate session-2333
Innovate session-2333Innovate session-2333
Innovate session-2333
 
Shawn Carlson Enterprise Transformation Leader CV
Shawn Carlson Enterprise Transformation Leader CVShawn Carlson Enterprise Transformation Leader CV
Shawn Carlson Enterprise Transformation Leader CV
 
Integrated Enterprise PPM, ALM and APM on force.com cloud
Integrated Enterprise PPM, ALM and APM on force.com cloudIntegrated Enterprise PPM, ALM and APM on force.com cloud
Integrated Enterprise PPM, ALM and APM on force.com cloud
 
Agile Development Process
Agile Development ProcessAgile Development Process
Agile Development Process
 
Principle 11 needs to go! by Ken France at #AgileIndia2019
Principle 11 needs to go! by Ken France at #AgileIndia2019Principle 11 needs to go! by Ken France at #AgileIndia2019
Principle 11 needs to go! by Ken France at #AgileIndia2019
 
A Practical Guide to Scaling Agile
A Practical Guide to Scaling AgileA Practical Guide to Scaling Agile
A Practical Guide to Scaling Agile
 
The Myriad faces of Agile Training & Certification
The Myriad faces of Agile Training & CertificationThe Myriad faces of Agile Training & Certification
The Myriad faces of Agile Training & Certification
 
Managing Hard Times With Quality & Project Management
Managing Hard Times With Quality & Project ManagementManaging Hard Times With Quality & Project Management
Managing Hard Times With Quality & Project Management
 
Solit 2014, Agile ValueTeam, учимся понимать Scrum, Семенченко Антон
Solit 2014, Agile ValueTeam, учимся понимать Scrum, Семенченко АнтонSolit 2014, Agile ValueTeam, учимся понимать Scrum, Семенченко Антон
Solit 2014, Agile ValueTeam, учимся понимать Scrum, Семенченко Антон
 
Agile in a nutshell
Agile in a nutshellAgile in a nutshell
Agile in a nutshell
 

Más de Precisely

Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fPrecisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsPrecisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenPrecisely
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsPrecisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyPrecisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellencePrecisely
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation ManagementPrecisely
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowPrecisely
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformancePrecisely
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPrecisely
 
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsMigrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsPrecisely
 
Americas Marketing Campaigns Tracker1234
Americas Marketing Campaigns Tracker1234Americas Marketing Campaigns Tracker1234
Americas Marketing Campaigns Tracker1234Precisely
 
9,000 Ways to Optimize Outcomes in Financial Services
9,000 Ways to Optimize Outcomes in Financial Services9,000 Ways to Optimize Outcomes in Financial Services
9,000 Ways to Optimize Outcomes in Financial ServicesPrecisely
 
Prozesseffizienz im Finanzbereich durch Automatisierung - am Beispiel "Comp...
Prozesseffizienz im Finanzbereich durch Automatisierung -   am Beispiel "Comp...Prozesseffizienz im Finanzbereich durch Automatisierung -   am Beispiel "Comp...
Prozesseffizienz im Finanzbereich durch Automatisierung - am Beispiel "Comp...Precisely
 
Data Integrity for Banking and Financial Services
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial ServicesPrecisely
 

Más de Precisely (20)

Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations Management
 
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsMigrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
 
Americas Marketing Campaigns Tracker1234
Americas Marketing Campaigns Tracker1234Americas Marketing Campaigns Tracker1234
Americas Marketing Campaigns Tracker1234
 
9,000 Ways to Optimize Outcomes in Financial Services
9,000 Ways to Optimize Outcomes in Financial Services9,000 Ways to Optimize Outcomes in Financial Services
9,000 Ways to Optimize Outcomes in Financial Services
 
Prozesseffizienz im Finanzbereich durch Automatisierung - am Beispiel "Comp...
Prozesseffizienz im Finanzbereich durch Automatisierung -   am Beispiel "Comp...Prozesseffizienz im Finanzbereich durch Automatisierung -   am Beispiel "Comp...
Prozesseffizienz im Finanzbereich durch Automatisierung - am Beispiel "Comp...
 
Data Integrity for Banking and Financial Services
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
 

Último

KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 

Último (20)

KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 

Agile Capacity Management

  • 1. Agile Capacity Management Dale Feiste, Principal Consultant
  • 2. Abstract Waterfall and agile processes have been applied to software development for many years. However, the same concepts can be applied to many other areas of business operation, including general IT activities such as capacity management. Terms such as lean, scrum, sprint, velocity, stories, etc. are used in agile development, and can be carried over into other areas as well, where they fit. Where agile concepts do not fit well, a more conventional or hybrid approach can be used. Underlying principles to improve efficiency is what should determine the methods used. Agile software development was formulated in 2001 by a group of developers who created a manifesto based on their experience with software development. The manifesto contained guiding principles the developers came to value in creating software. Mapping these concepts over to other areas of business operation, where efficiency could be improved, was a natural evolution. Primary factors for agile processes is that it be customer centric and fast. This paper covers the idea of applying agile processes to the function of capacity management and real experiences carrying out capacity management in a company that has embraced Scaled Agile methodologies. 2Syncsort Confidential and Proprietary - do not copy or distribute
  • 3. Contents Agile processes from the beginning Capacity management requirements Mapping agile processes and executing them Lessons learned Future ideas 3Syncsort Confidential and Proprietary - do not copy or distribute
  • 4. Agile processes from the beginning Agile processes respond to unpredictability through incremental, iterative workflows and empirical feedback. Agile processes can be an alternative to waterfall, or traditional sequential processes. It advocates adaptive planning, evolutionary creation, early implementation, and continuous improvement, and it encourages rapid and flexible response to change. 4Syncsort Confidential and Proprietary - do not copy or distribute
  • 5. Agile processes from the beginning Agile methodologies provides opportunity to assess the direction of value delivery throughout the creation lifecycle. Progress is achieved through periodic iteration of work, known as sprints, at the end of which team present a potentially shippable functionality. By focusing on repetition of abbreviated work cycles, as well as functional output produced, agile methodology can be described as “iterative” and “incremental.” 5Syncsort Confidential and Proprietary - do not copy or distribute
  • 6. Agile processes from the beginning A primary difference between agile methods and other approaches, is that quality and value is measured immediately after changes are made. Because this happens in iterations, users of the output can frequently use the new functionality to validate value. After users know the real value of the updated functionality, better decisions can be made about what should be delivered in the future. Having retrospective sessions in each iteration, Scrum typically has iterations of just two weeks, helps the team continuously adapt its plans to maximize the value it delivers. 6Syncsort Confidential and Proprietary - do not copy or distribute
  • 7. Capacity management requirements Mission Ensuring the best use of the appropriate IT infrastructure to cost- effectively meet the business needs both now and in the future Understanding how IT services will be used and matching resources to deliver services at agreed levels (SLAs) now and in the future Syncsort Confidential and Proprietary - do not copy or distribute 7
  • 8. Capacity management requirements Key Task Ensuring adequate capacity Performance Monitoring Tuning Forecasting resource demands and service levels Producing the Capacity Plan 8Syncsort Confidential and Proprietary - do not copy or distribute
  • 9. Capacity management requirements Objects Ensure the right level of ITI investment Identify and resolve bottlenecks Evaluate tuning strategies Improve and report/publish performance “Right-size” or “consolidate” Ensure accurate and timely procurements Ensure effective service level management Plan for workload growth, new apps / sites Avoid performance disasters 9Syncsort Confidential and Proprietary - do not copy or distribute
  • 10. Inputs OutputsSub-Process Business Service Component Technology SLAs Business Plans Operations Budgets… Capacity Plan SLA guidelines Thresholds Charging Audits… Inputs and Outputs Capacity management requirements 10Syncsort Confidential and Proprietary - do not copy or distribute
  • 11. Capacity management requirements Inputs Technology SLAs, SLRs, and Service Catalogue IT Plans and Strategy Business Requirements and Volumes Operational Schedules Deployment and Development Plans Forward Schedule of Changes (Change Management) 11Syncsort Confidential and Proprietary - do not copy or distribute Incidents and Problems (Incident Management and Change Management) Service Reviews SLA Breaches Financial Plans Budgets
  • 12. Capacity management requirements Outputs Capacity Plan Capacity Management Information System (CMIS) Baselines and Profiles Thresholds and Alarms Capacity Reports (regular, ad-hoc, exception) SLA and SLR recommendations Costing and charging recommendations Proactive changes and service improvements Revised operational schedule Effectiveness reviews Audits 12Syncsort Confidential and Proprietary - do not copy or distribute
  • 13. Activities Business Service Component Capacity Plan Capacity Management Information System (CMIS) Demand Management Modeling Application Sizing Monitor Analyze Tune Implement Capacity management requirements 13Syncsort Confidential and Proprietary - do not copy or distribute
  • 15. Waterfall Methodology -> http://www.innovapptive.com/blog/wp-content/uploads/2013/10/agile_scrum_methodology.jpg Mapping agile processes and executing them 15Syncsort Confidential and Proprietary - do not copy or distribute
  • 16. Mapping agile processes and executing them Scrum Roles Product Owner Scrum Master Development Team Scrum Activities and Artifacts Product Backlog Sprints Sprint Planning Sprint Execution Daily Scrum Sprint Review Sprint Retrospective 16Syncsort Confidential and Proprietary - do not copy or distribute
  • 17.  Scrum Storyboard Scrum Burndown Chart  Mapping agile processes and executing them 17Syncsort Confidential and Proprietary - do not copy or distribute
  • 18. • Capacity Assurance • Monitoring • Tuning • Forecasting • Capacity Plans Completing capacity management tasks with agile methodology follows the same process as with other work, such as software development. Product Backlog Stories • Capacity Plans • CMIS • Baselines • Alarms • Reports • SLAs • Recommendations • Improvements • Schedules • Reviews • Audits Output Mapping agile processes and executing them 18Syncsort Confidential and Proprietary - do not copy or distribute
  • 19. http://www.scaledagileframework.com Mapping agile processes and executing them - Scaled Agile What is “Scaled Agile”? Scaled Agile Framework (or SAFe) is an agile software development framework consisting of a knowledge-base of integrated patterns intended for enterprise-scale Lean-Agile development. Its proponents consider SAFe to be scalable and modular, allowing an organization to apply it in a way that suits its need, including non-development areas like capacity management. Before realizing SAFe rewards, organizations must embrace a Lean-Agile mindset, and understand and apply Lean-Agile principles. Achieving the business benefits of Lean-Agile processes at scale is not a trivial effort, and SAFe is not a trivial framework. 19Syncsort Confidential and Proprietary - do not copy or distribute
  • 20. Mapping agile processes and executing them - Scaled Agile The Transition to Scaled Agile Framework Went from project-driven to product-driven. Capacity Planning team merged with IT Facilities and Monitoring to become Facilities, Capacity, Monitoring Service. Infrastructure became service-oriented (Server, Storage, Middleware). No longer Engineering/Operations split. Essentially all of traditional IT switched to the Scaled Agile Framework (SAFe) as our new way of working. Individual Service/Product teams are using SCRUM or Kanban to track work. Adoption rates vary across the organization. 20Syncsort Confidential and Proprietary - do not copy or distribute
  • 21. Mapping agile processes and executing them - Scaled Agile 21Syncsort Confidential and Proprietary - do not copy or distribute
  • 22. Lessons learned Unplanned work. Areas of the organization that are not using same methodology or iteration/sprint schedule Data Centers/Power Infrastructure may not always be “agile” Huge backlog Silos can get worse In something like Scrum/SAFe, the ceremonies and formalities might seem heavy and killing efficiency. 22Syncsort Confidential and Proprietary - do not copy or distribute
  • 23. Lessons learned Rapidly changing capacity requirements or lack thereof Planning away the ability to be curious Cadence of short sprints and capacity reporting work well together More visibility into what we provide the business Learning/Training – plan, show the value, do Better teamwork Less trying to predict resource needs from waterfall style development and delivery Watch out for your company being sold “agile as a product” and not doing things how it works best for your organization. 23Syncsort Confidential and Proprietary - do not copy or distribute
  • 24. Future ideas Timeframes rarely allow for a large, all-encompassing enterprise plan Plans live through ongoing/incremental work items Respond to change 24Syncsort Confidential and Proprietary - do not copy or distribute
  • 25. Future ideas Still need long-term data; unless you don’t The plan and results achieved are much more visible Any formal plans need to be kept much more simple, as things are changing much more rapidly 25Syncsort Confidential and Proprietary - do not copy or distribute
  • 26. Thank you for attending Agile Capacity Management Questions or comments?