Commitment in ScrumCommitment in Scrum

Short note taken long time ago from Henrik Kniberg’s slides about a few aspects of commitment in Scrum

This is a note to self. Note taken long ago from Scrum beyond trenches slides by Henrik Kniberg. Just for myself not to forget.

The sprint commitment – misconceptions

”We promise to achieve this goal”
“We promise to deliver all stories included in the sprint backlog”

I’ll repeat!. These are misconceptions!

 Team’s commitment to the product owner

We promise that:

“… we believe we can reach the sprint goal.”
“… we will do everything in our power to reach the sprint goal, and will let you know immediately if we no longer believe we can reach it.”
“… we believe that we can complete all stories included in the sprint backlog.”
“… we will demonstrate releasable code at the end of the sprint.”
“… if we fall behind schedule we will talk to you and, if necessary, remove the lowest priority stories first.”
“… if we get ahead of schedule, we will add stories to the sprint from the product backlog, in priority order.”
“… we will display our progress and status on a daily basis.”
“… every story that we do deliver is Done.”

Hmm, the opposite of misconceptions should be conceptions, right :D?

Your experience

Would you add any more to these lists? Do you have any experience being hit by wrongly understood commitment? Share!

You May Also Like

[:en] Operational problems with Zookeeper

This post is a summary of what has been presented by Kathleen Ting on StrangeLoop conference. You can watch the original here: http://www.infoq.com/presentations/Misconfiguration-ZooKeeper I've decided to put this selection here for quick reference. ...This post is a summary of what has been presented by Kathleen Ting on StrangeLoop conference. You can watch the original here: http://www.infoq.com/presentations/Misconfiguration-ZooKeeper I've decided to put this selection here for quick reference. ...

Spring Security by example: securing methods

This is a part of a simple Spring Security tutorial:

1. Set up and form authentication
2. User in the backend (getting logged user, authentication, testing)
3. Securing web resources
4. Securing methods
5. OpenID (login via gmail)
6. OAuth2 (login via Facebook)
7. Writing on Facebook wall with Spring Social

Securing web resources is all nice and cool, but in a well designed application it's more natural to secure methods (for example on backend facade or even domain objects). While we may get away with role-based authorization in many intranet business applications, nobody will ever handle assigning roles to users in a public, free to use Internet service. We need authorization based on rules described in our domain.

For example: there is a service AlterStory, that allows cooperative writing of stories, where one user is a director (like a movie director), deciding which chapter proposed by other authors should make it to the final story.

The method for accepting chapters, looks like this:

Read more »