Browse Definitions :

Agile software development

Definitions related to agile software development, including terms about Scrum and words and phrases about user stories, extreme programming (XP), Crystal, feature-driven development and Adaptive.

12 - WOR

  • 12 factor app (twelve-factor app) - Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service.
  • ad hoc test - An ad hoc test is an unplanned and undocumented procedure designed to assess the viability of a product.
  • ad hoc testing - Ad hoc testing is a non-methodical approach to assessing the viability of a product.
  • Agile Manifesto - The Agile Manifesto is a document that identifies four key values and 12 principles that its authors believe software developers should use to guide their work.
  • Agile retrospective - An Agile retrospective is a meeting that's held at the end of an iteration in Agile software development.
  • Agile Software Development - Agile software development -- also referred to simply as Agile -- is a type of development methodology that anticipates the need for flexibility and applies a level of pragmatism to the delivery of the finished product.
  • agile test automation pyramid - The agile test automation pyramid is a graphical strategy guide for implementing automated software testing.
  • Agile velocity - Agile velocity is a metric that predicts how much work a software development team can successfully complete within a two-week sprint (or similar time-boxed period).
  • agnostic - Agnostic, in an information technology (IT) context, refers to something that is generalized so that it is interoperable among various systems.
  • application lifecycle management (ALM) - Application lifecycle management (ALM) is an integrated system of people, tools and processes that supervise a software application from its initial planning through retirement.
  • automated testing - Automated testing is a process that validates if software is functioning appropriately and meeting requirements before it is released into production.
  • Certified ScrumMaster (CSM) - Certified ScrumMaster (CSM) is an entry-level credential designed to give professionals getting started as Scrum practitioners an understanding of the project management methodology.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • citizen development - Citizen development is a business process that encourages non-IT-trained employees to become software developers, using IT-sanctioned low-code/no-code (LCNC) platforms to create business applications.
  • continuous delivery (CD) - Continuous delivery (CD) is an approach for software delivery in which development teams produce and test code in short but continuous cycles, usually with high degrees of automation.
  • continuous software development - Continuous software development is a blanket term that covers several aspects of an iterative application development process based on making each change when it is ready, rather than wrapping many changes into large batches.
  • Conway's law - Conway’s law is an observation that the design of any system is significantly affected by the communications structure of the organization that develops it.
  • culture of failure (blameless culture) - A culture of failure is a set of shared values, goals and practices that encourages learning through experimentation.
  • definition of done - A definition of done is a checklist of criteria that a product, product increment or project must satisfy to be considered completed.
  • DevOps Dojo - DevOps Dojos provide software developers and operations engineers with an immersive learning environment where team members can gain practical work experience without having to worry about introducing errors into the production environment.
  • DevSecOps - DevSecOps (development plus security plus operations) is a management approach that combines application development, security, operations and infrastructure as a code (IaaS) in an automated, continuous delivery cycle.
  • Disciplined Agile Delivery (DAD) - Disciplined Agile Delivery (DAD) is a scalable Agile software delivery framework.
  • empiricism - Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses.
  • exploratory testing - Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes.
  • feature-driven development (FDD) - Feature-driven development (FDD) is an Agile software development methodology that can be used by development teams and managers with the intention of bringing a steady, continuous flow of new features to users at a set time.
  • fist to five (fist of five) - Fist to five, also called fist of five, is a technique used by agile software development teams to poll team members and help achieve consensus.
  • Force.com - Force.com is a Platform as a Service (PaaS) product designed to simplify the development and deployment of cloud-based applications and websites.
  • idempotence - Idempotence, in programming and mathematics, is a property of some operations such that no matter how many times you execute them, you achieve the same result.
  • improvement kata - The improvement kata is a four-step routine for working toward a goal in a systematic way.
  • information radiator - An information radiator, also known as a Big Visible Chart (BVC), is a large graphical representation kept plainly in sight within an agile development team’s shared workspace.
  • Jenkins - Jenkins is an open source continuous integration/continuous delivery and deployment (CI/CD) automation software DevOps tool written in the Java programming language.
  • JUnit - JUnit is an open source framework designed for the purpose of writing and running tests in the Java programming language.
  • lean software development - Lean software development is a concept that emphasizes optimizing efficiency and minimizing waste in the development of software.
  • mobile application development - Mobile application development is the set of processes and procedures involved in writing software for small, wireless computing devices.
  • Muda, Mura and Muri - Muda, mura and muri are three types of wasteful actions that negatively impact workflow, productivity and ultimately, customer satisfaction.
  • NUnit - NUnit is an evolving, open source framework designed for writing and running tests in Microsoft .
  • peer review - Peer review is a process used for checking the work performed by one's equals (peers) to ensure it meets specific criteria.
  • pigs and chickens - Pigs and chickens is an analogy used in the Scrum software development model to define the type of role an attendee can play at a daily scrum meeting.
  • PMI (plus, minus, interesting) retrospective - PMI (plus, minus, interesting) is a brainstorming activity that encourages participants in a discussion to look at an idea from more than one viewpoint.
  • product backlog grooming - Product backlog grooming is an Agile software development process in which the development team revisits a pre-defined product backlog, working with stakeholders to prioritize and break the backlog list into user stories for future use.
  • product owner - A product owner is a role on a Scrum team that is accountable for the project's outcome.
  • rescoring - Rescoring is an Agile software development process in which the development team revisits a pre-defined list of user stories to review story point scores and adjust them up or down based on what the team has learned in previous development iterations.
  • SAFe (Scaled Agile Framework) - The Scaled Agile Framework (SAFe) is a framework for scaling Agile across the enterprise.
  • Scrum Master - A Scrum Master is a facilitator for an Agile development team.
  • SecOps - SecOps is a management approach that connects security and operations teams, similar to how DevOps unifies software developers and operations professionals.
  • shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.
  • six thinking hats retrospective - Six thinking hats is a tool for structuring a discussion.
  • social coding - Social coding is an approach to software development that places an emphasis on formal and informal collaboration.
  • software testing - Software testing is a method of assessing the functionality of a software program.
  • source code analysis - Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold.
  • spike - A spike is a sharp rise in the frequency for a given variable, usually immediately followed by a decrease.
  • sprint (software development) - A sprint is a set period of time during which specific work has to be completed and made ready for review.
  • stand-up - In agile software development, a stand-up is a daily progress meeting, traditionally held within a development area.
  • static testing - Static testing is a software testing method that involves the examination of a program, along with any associated documents, but does not require the program to be executed.
  • story - In agile software development, a story is a particular business need assigned to the software development team.
  • technical debt - In software development, technical debt is a metaphor equating Extreme Programming’s incremental, get-something-started approach with the easy acquisition of money through fast loans.
  • test-driven development (TDD) - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.
  • triage - Triage is the procedure of assigning levels of priority to tasks or individuals to determine the most effective order in which to deal with them.
  • user acceptance testing (UAT) - In software development, user acceptance testing (UAT)—also called application testing, and end user testing—is a phase of software development in which the software is tested in the "real world" by the intended audience.
  • user story - A user story is a tool used in Agile development to capture a description of a software feature from an end-user perspective.
  • value stream mapping - Value stream mapping is a Toyota lean manufacturing visualization tool for documenting all the processes that are required to bring a product to market.
  • WAG (estimate) - A WAG (wild-ass guess) is an estimate for how long it will take to complete a project.
  • water-Scrum-fall - Water-Scrum-fall is a hybrid approach to application lifecycle management that combines waterfall and Scrum development methodologies.
  • What is DevOps? The ultimate guide - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • whole-team approach (team-based approach) - Whole-team approach, also called team-based approach, is a strategy for project management in which everyone on the project team is held equally responsible for the quality and success of the project.
  • WIP limit - A WIP (work in progress) limit is a strategy for preventing bottlenecks in software development.
  • Wizard of Oz prototyping - Wizard of Oz prototyping is a tactic used by developers to give the appearance that an application or program has been completely automated when, in fact, it hasn't.
  • worst-case execution time (WCET) - Worst-case execution time (WCET) is a software development metric that determines the maximum length of time a task or set of tasks requires on a specific hardware platform.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close