Marquee

Do you need a website for your Church, School, Business or NGO? Just give us a call: +233 24 311 5791 or +233 20 909 1616

Monday, 19 April 2021

SCRUM: The New Way To Manage your IT and other Projects

SCRUM has quickly become the new standard way to do IT projects. In this article, the authors explain the way SCRUM differs from traditional methods of project management like PRINCE 2 or PMP and why it may help you as a business owner to achieve your goals.

Traditional project management demands detailed upfront planning for a complete project. There is a lot of attention to fixing the scope, in terms of the end product, delivery date, and budget. These parameters must be managed and reported, often in bulky documents to bureaucratic committees. Whereas SCRUM encourages data-based, iterative decision making in which the primary focus is on delivering products that satisfy customer requirements.

To deliver the greatest amount of value in the shortest amount of time, SCRUM promotes prioritization and time-boxing over fixing the scope, cost, and schedule of an entire project. Important features of SCRUM are self-management and cross-functionality, which allow the individuals who are actually doing the work to estimate and take ownership of tasks.

There has always been a lot of “pride” with people who were doing projects in PMP or PRINCE 2, but in reality, there were many problems, in particular in IT projects.

In a lot of projects, the scope seems to be clear in the beginning, but as time goes on, there are either new insights or new external developments that require a change. In such cases, classical project management is too slow and inflexible because it requires time-consuming decision-making. In the end, the project either does not meet the expectations of the end-users or has exceeded its timelines and budgets excessively. Everyone is disappointed.

In classic project management, a lot of roles and responsibilities are clearly defined, and processes are being put in place to help the project advance (monitoring, change management, etc.). This looks solid, but it is not only slowing down the pace of the work (you have to wait for another board meeting before you can continue). It also gives people the entitlement to stick to their own responsibilities only, rather than taking charge of the total project result. One can always refer management to another team member to be blamed for the problems.

SCRUM, on the contrary, acknowledges that most problems are messy, and realities are always changing. It tries to be productive and creative in such a context, AGILE SO TO SPEAK. At the same time, it wants to deliver products of the highest possible value.

In 2000, SCRUM inventors Ken Schwaber and Jeff Sutherland were so frustrated about costly and failing IT projects, that they created the SCRUM guide as an alternative. So, SCRUM is a lightweight framework that helps people, teams, and organizations generate value through adaptive solutions for complex problems. SCRUM as a concept originates in Rugby as the frequent get-together of a team to restart the match after an incident. The SCRUM guide elaborates on that principle with accountabilities, events, artifacts, and the rules that bind them together.

Although SCRUM may be unsuitable for certain projects (like the construction of a power plant where everything needs to be planned upfront) you may want to explore the possible advantages for your business such as faster delivery, higher customer satisfaction, or happy personnel. Learning SCRUM is not difficult: an interactive course of a few days may get you started (various institutes like Maxim Nyansa IT Solutions in Accra, provide in-company training with optional certification exams). But the practice is harder than it seems because SCRUM profoundly changes the way people in the organization interact.

We see that organizations that actually benefit from SCRUM are those who have actively engaged the management as well as the SCRUM teams in the introduction of the concept. Everyone needs to be involved.

For the managers, this is most difficult. They are used to having control of an entire team, but in SCRUM the team gets most of the responsibilities. In the beginning, it may be scary to let go of certain things, but often it turns out to be an advantage that the team members all bring in their talents and ideas and take charge of the result. And of course, any change in the way you work will evoke a certain level of fear and resistance. SCRUM is no exception in that, you must have the courage to embrace change.

However, you will soon find out that your employees will enjoy their work more and be more productive. 

If you think this article is appealing to you, you may give it a try starting with a pilot in one of your projects or teams after a short practical training. But if you believe that SCRUM is still a bridge too far for your organization, note that the approach can also be used in your personal life or for your personal development. For example, you can use SCRUM techniques to set your personal goals for your week, your year, or for your personal development. Then, use other SCRUM tools to plan your actions, to monitor, evaluate and continuously improve yourself.

Author: Diana van der Stelt is a social entrepreneur outsourcing SCRUM teams to the Netherlands at Trinity Software Center in Kumasi and the Co-founder of Maxim Nyansa IT solutions, an IT training center in Accra | Member, Institute of ICT Professionals Ghana. Elvin Assiam, agile SCRUM trainer and consultant with Maxim Nyansa IT solutions

For comments, contact dianavanderstelt@trinitysoftwarecenter.com

Source: www.iipgh.org

Monday, 5 April 2021

Mobile App Permissions – what you need to know


The growth of the mobile application (app) industry is on the ascendancy. Using smartphones have increased and serves as a major driver of innovations. Companies have leveraged the capability of the smartphone to lower costs at various levels. Unfortunately, certain elements in society have taken undue advantage of the growth in the mobile app industry. The interest of unscrupulous mobile app developers have led to the collection of excessive amounts of personal information for various reasons, including aggressive marketing campaigns.

Mobile apps may require access to both the capabilities of the devices they reside on and the user information contained on those devices to function. As users go about their lives, their mobile devices produce a vast trove of personal information and data, ranging from the user’s location to a history of his or her phone calls or text message interactions. This puts apps at the center of debates about privacy in the digital age.

Mobile apps operate on the principle of permissions, to protect your data from exploitation. This means that applications can access hardware and data only if they are given permission. The system maintains a list of permissions for each application installed on the device. Mobile apps permissions have improved a lot over the years. Despite that, the apps are not trustworthy. Mobile apps’ permission system is intended to inform users about the risks of installing applications. When a user installs an application, he or she has the opportunity to review the application’s permission requests and cancel the installation if the permissions are excessive or objectionable.

The permissions you have granted to apps you installed, give the apps control over your phone and access to your private conversations, photos, and more. Anyone concerned about their privacy and security should keep an eye out for apps that request access to some critical permissions. For example, if you allow an app access to your camera, the app will automatically have access to take pictures as well.

The following access must be carefully scrutinized and any app that seeks access must be watched carefully according to AVG (https://www.avg.com/en/signal/guide-to-android-app-permissions-how-to-use-them-smartly#topic-2)

Body Sensors

Allow access to your health data from heart-rate monitors, fitness trackers, and other external sensors. Fitness apps need this permission to monitor your heart rate while you exercise, provide health tips, etc. A malicious app could spy on your health.

Calendar

Allows apps to read, create, edit, or delete your calendar events. Calendar apps obviously need this permission to create calendar events, but so do social networking apps that allow you to add events and invitations to your calendar. A malicious app can spy on your personal routines, meeting times, etc. — and even delete them from your calendar. 

Camera

Allows apps to use your camera to take photos and record videos. Camera apps need this permission so you can take pictures. A malicious app can secretly turn on your camera and record what is going on around you.

Contacts

Allows apps to read, create, or edit your contact list, and access the list of all accounts (e.g., Facebook, Instagram, Twitter, etc.) used on your device. A communication app can use this to let you text or call other people on your contact list. Likewise, a malicious app can steal the entire contents of your address book and then target your friends and family with spam, phishing scams, etc. 

Location

Allows apps to access your approximate location. Navigation apps can help you get around and a malicious app can secretly track your location to build a profile on your daily habits, or even let thieves know when you’re not at home.

Microphone

Allows apps to use your microphone to record audio. A communication app can use this to allow you to send voice messages to your friends. A malicious app can secretly record what’s going on around you, including private talks with your family, conversations with your doctor, and confidential business meetings.

Phone

Allows apps to know your phone number, current cellular network information, and ongoing call status. Apps can also make and end calls, see who’s calling you, read and edit your calling logs, add voicemail, use VoIP, and even redirect calls to other numbers. A malicious app can spy on your phone habits and make calls without your consent (including paid calls).

SMS

Allows apps to read, receive, and send SMS messages. Communication apps can use this to let you message your friends. A malicious app can spy on your messages, use your phone to spam others, and even subscribe you to unwanted paid services. 

Storage

Allows apps to read and write to your internal or external storage. An app can save downloaded songs to your SD card, or a social networking app can save your friends’ photos to your phone. A malicious app can secretly read, change, and delete any of your saved documents, music, photos, and other files.

 Author: Emmanuel K. Gadasu

Member & Data Protection Officer, IIPGH | Data Privacy Consultant at Information Governance Solutions

 

For comments, contact author  ekgadasu@gmail.com  or Mobile: +233-243913077

 

BB's Popular Posts