Browse Definitions :
Definition

definition of done

A definition of done is a checklist of criteria that a product, product increment or project must satisfy to be considered completed. 

The term is used in agile software development and agile project management.  The team collaboratively develops and agrees to all the stipulations of the definition.

The need for such a list arose as a way to ensure that all involved parties clearly understand what is meant when someone says something is “done.”  A programmer, for example, might say software was done once he had finished writing the code. On the other hand, a product owner might not consider the software done until it had been thoroughly tested and was essentially ready for release. The definition of done is intended to be stringent enough to satisfy any stakeholder.

Here’s a sample definition of done:

  1. The build is in a release-ready state and available for download.
  2. Documentation is complete.
  3. Any unimplemented or inactive features are hidden from the user.
  4. Testing is complete.
  5. The source code is committed on the server.
  6. Code has been reviewed.
  7. Demo or manual has been reviewed and presented to the product owner.
  8. The product owner has given approval.

A definition of done might be posted in a visible area in the team’s shared workspace, on what is called a Big Visible Chart (BVC) or an information radiator.

This was last updated in October 2013

Continue Reading About definition of done

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close