Documente Academic
Documente Profesional
Documente Cultură
caseThis paper was used as a syndicate case-study as part of a session run by Brian 29 Wernham at the Agile North conference on June 29, 2012 in Preston, UK
Agile Project Management for Government is being published by Maitland and Strong on July 31, 2012. You may reproduce this paper on a non-commercial basis in print and on the Internet, but only in its entirety and as long as you attribute Brian Wernham as follows:
Wernham, Brian (2012): Agile Project Management for Government. New York, London: Maitland and Strong
Two servicemen killed in southern Afghanistan this week died as a result of friendly fire the wrong location seems to have been fired upon. The Guardian, London 17 January, 2009
On January 14, 2009, Captain Tom Sawyer, 26, of the Royal Artillery, and Corporal Danny Winter, 28, of the Royal Marines, died in a friendly fire incident in Helmand province. This increased the number of British troops killed by friendly fire in Afghanistan operations to six. A subsequent investigation revealed that they were killed by a Javelin heat-seeking missile fired by friendly coalition forces in bad visibility whilst they were providing mortar ground support. This was not the first time a missile had been involved in a friendly fire incident. In October 2007 British troops killed two Danish soldiers with Javelin heat-seeking missiles.1
9 00 2 no sgd oH , sm a ill iW
data relating to both the target and the nearest friendly forces should be mandatory.2
In 2009 the UK Ministry of Defense (MoD) initiated a project to create a Combat Identification Server (CIDS). The CIDS was needed to tightly integrate close air support with shared situational position information the technology that gave service personnel almost instant information on the whereabouts of friendly combatants in deadly situations. A contract was awarded to General Dynamics to develop the CIDS to be in place by July 2010.3 It needed to provide autonomous, accurate near realtime force tracking and location information to direct fire away from coalition troops. General Dynamics had only 18 months to integrate their Net-Link tactical gateway with their sub-contractors specialist technology. Rockwell Collins was to provide its Rosetta multi-link gateway and QinetiQ was to provide its CMISE correlation engine which would knit real-time data together to provide battle information in the heat of war.4
la n igi ro eh t e su o t e u nit no c sre no iti t carp t so m e cni s ,re ve woh ,d e su g nie b em a n r eh tie e e s yam uo y
2 3 4 5
situation was sought by both the MoD and General Dynamics which recognized the advantages of ongoing re-planning rather than sticking to the theoretical plan. As evidence of progress informed the team, and as requirements that had not been identified at project outset were discovered, the plan would flex.6 The DSDM method helped test and evaluate the solution as a constant and regular activity, and allowed the development team and the stakeholders to gain more confidence at each iteration. Three main phases were planned:7 Foundations (Feb May 2009) Exploration and Engineering (Jun 2009 April 2010): in three iterations of about 3 months each: o Iteration 1: Create a simple version of the software that could deal with one friendly force position. Iteration 2: Extend the software to cater for multiple friendly forces Iteration 3: Make the solution robust and fast enough to deal with the operational number of request responses and to interface with systems from other coalition partners.
Deployment and demonstration (May Jul 2010) This initial Foundation phase created an architecture that would ensure tracking information could be collated from 15 different sources in any battlefield. The UK Bowman system would now collaborate with the key coalition sources providing friendly position data. For example, the architecture had to be flexible enough to allow near-real time information on the position of friendly forces to not only artillery, but also other ground fire and aircraft. 8 DSDM stresses the need for scalability from the smallest project to the very largest. It concentrates on governance and structures around incremental project outputs.
6 7 8
DSDM has a long pedigree. It was first published in the UK in 1994 as an alternative method avoiding the pitfalls of Waterfall methods that were being encouraged. Although it started as a proprietary method closely controlled by a small consortium, in 2007 the decision was taken to make the method more openly available. The manual is now available to all for free on the Internet at www.dsdm.org and training may be bought from many suppliers (subject to training body certification requirements of the DSDM consortium). 9 At 202 pages, the handbook may not on first appearances appear to reflect the ideal of a light-weight method. DSDM is process and output orientated. It prescribes seven main steps for every DSDM project creating up to 43 products each described in the handbook in some detail. The first and last of the seven steps simply cover pre-project and postproject activities. It is the middle five steps that cover the DSDM project lifecycle: Feasibility (Step 1) where an outline business case is created before much planning work has started Foundations (Step 2) where enough (but not too much or too little) architecture and requirements work is carried out to allow work to start Exploration (Step 3), Engineering (Step 4) and Deployment (Step 5) repeated as many times as required to meet the project aims. One of the strengths and flexibilities of DSDM is that steps 3, 4 and 5 may be carried out in whatever order or combined together, or omitted depending on the technology being implemented, and ease of deployment. For example, if one month iterations are being followed, but updates to end-users are restricted by a wider organizational policy to once every three months, then only every third iteration will include a deployment step. This DSDM method is intended to be very different from the traditional, or Waterfall approach to project management. Waterfall projects are segmented into discrete phase, each dependent on the completion of the previous phase, but with no feedback or iteration. When using a Waterfall approach, one cannot start a phase until the previous has been completed. This leads to a series of one-way gates (see Figure 1). Once one has committed to swimming downstream, it is impossible to return to an earlier stage without a lot of effort like attempting to swim up a waterfall!
80 02 m ui tro sn oC MDSD
The strength of DSDM is that it presents Agile concepts in a structured fashion, using terms that traditional project managers understand, whilst avoiding a Waterfall approach. Processes and outputs are defined that are amenable to traditional project management techniques. For example: Quality planning is used to define the necessary levels of acceptance for project outputs this provides a definition of done for each output that can be objectively tested and audited. Requirements planning is used to maintain Prioritized Requirements List (PRL), with mandatory release dates defined for all Must Have requirements, and tentative release dates for Should have and Could have requirements Earned Value Analysis (EVA) can be carried out to compare the actual versus estimated development effort originally expected for each product feature in the PRL, thus providing feedback on the accuracy of the original estimates and the productivity of the team. Thus a high level of compatibility between the overall Agile approach and some specific useful formal project management techniques can be achieved. Techniques such as EVA are mandated by US law for large Government projects, so this compatibility is very important.
1 .p , 07 91 e c yoR W n ot sn iW
01
The DSDM method adopts the Agile approach to guard against cost and time overruns by turning the baselining model on its head. Previously, a detailed baseline for the scope of a project would be agreed supported by detailed assumptions and theoretical estimates, If the estimates were inaccurate (and of course they often are as they are made before work begins and actual progress becomes evident) the only variables left in the equation would be cost and/or timescales. Since the baseline would be fixed, then these mutually dependent parameters would be flexed more time would be taken, with the fixed costs running a large project team continuing to be borne by the business whilst the timescale for the delivery of a solution slipped (see Figure 2 the Traditional Approach). But DSDM only fixes a central core of product features at the outset and flexes the scope as the inevitable mis-estimation of time and cost becomes clearer. The opposite of scope creep takes place scope is reduced if difficulties are encountered. DSDM fixes cost and time and flexes the features to be delivered. In effect, there is zero time or cost contingency, but there is contingency in the scope of requirements (see Figure 2). At its simplest, features left out of one iteration are simply deferred to the next iteration. This can work both ways: if better than expected progress is made, then features that were only on a wish list for an iteration may be included some delight and surprise for the stakeholders!
Figure 2: Waterfall fixes features and allows cost and time to vary DSDM fixes time and cost, only the number of features vary
DSDM recommends that no more than 60% of the work expected for each iteration of development should be on features classified as Must Haves about 40% of the remaining work is split between Should Haves and Could Haves. The Should Haves are features that are not absolutely essential, in
that workarounds can be put in place if they are not present. Could Haves are features that bring additional value-add and business benefits, but can be delayed for future work without any immediate downside. To complete the picture, and to ensure that limitations to scope are understood, some requirements are classified as Wont Haves. The actual percentages should be reviewed with regard to the predictability of the overall scope of the project. If the scope is well understood, in a stable business environment and the target technology has been previously used, then perhaps a lower percentage of requirements could be in the tentative category of Could Haves. However, it is tempting to make simplifying assumptions and move back into the realms of traditional fixed-scope estimating, and then find that the assumptions are false, and that development will be more problematical than expected. It is better to achieve an over-delivery of output features than promise too many mandatory features and under-deliver.
from delivery in that iteration. Effort instead is focused on ensuring that the higher priority features are of adequate quality.
11 21
whole project), and a Business Visionary (responsible for decisions on day-today issues). Risks were recorded on a risk register and linked to items on the PRL to provide a means for prioritization and replanning. Again, the overriding concern was to maintain an iron grip on cost by flexing the delivery of functions to deal with risks as they emerged.
31 41
10
example, was based on a land battle group carrying out counter-insurgency operations. The simulated mission was for the UK to coordinate a multinationality NATO attack on an insurgent compound in a desert storm. Proof was needed that the system would be able to provide friendly force ID to all units (including artillery and attack aircraft) in a difficult environment. The team found that the Agile DSDM method enforced a discipline of delivering into a formal test environment at the end of every iteration. This increased the focus on interoperability the key to the development. Although various items were re-prioritized for each iteration, in the end, the flexibility and discipline of the DSDM method adopted meant that important requirements were not sacrificed.15
,VAN CAF ,ta m roF eg a s seM el ba ira V , ,m et s yS g ni k car T te s sA dn uo rG , NAM WOB , 61 kni L/S DIM
63 1 .p ,1 10 2 n en ia le raa s o sla d na ytil ib ap a c d na m ed -no sto lip e vi g dl uo w lo ot DI tab m o c weN SNAM RON d na CaTRON
51 61 71
11
In addition, even though the Danish aircraft had not been specifically prepared for the exercise when they arrived they were immediately able to make successful requests friendly force ID using their Link 16 technology.18
Discussion Questions
1. The MoD, as customer, had indicated its eagerness to use an Agile method. If the MoD had specified a Waterfall approach what arguments could the suppliers have used to convince them of the risks of Waterfall and the advantages of Agile? 2. The MoD had indicated their inexperience with Agile. What risks were there in using an Agile approach? 3. What strengths and weaknesses are there in the application of DSDM to the CCID project outlined above? (Draw on your own business experiences of projects whether Agile or Waterfall). 4. The MoD procurement division had been keen to nail down the suppliers to a fixed specification. What may have been their thinking? How would you draw up an Agile contract that would suppliers to account? 5. Agile projects are expected to iteratively deliver a working solution. An Agile project should have a natural preference for shorter rather than longer timescales between iterations. Did the CIDS project meet these criteria? Could more have been done to make the project more Agile?
0 10 2 L DS3
81
12
Publication bibliography
Slabodkin, Greg (2011): New combat ID tool would give pilots on-demand capability. Available online at http://defensesystems.com/articles/2011/02/28/c4isr1-blue-force-tracking-sidebar.aspx, checked on 18/06/2012. 3SDL (2010): Case Study: Exercise Bold Quest 2010. Available online at http://www.3sdl.com/success-stories/exercise-bold-quest.aspx, checked on 18/06/2012. DSDM Consortium (2008): DSDM Atern The Handbook. v4.2. General Dynamics (2009): General Dynamics UK-Rockwell Collins-QinetiQ team completes Foundation Review on situational awareness contract. Available online at http://www.generaldynamics.uk.com/news/general%20dynamics%20ukrockwell%20collinsqinetiq%20team%20completes%20foundation%20review%20on%20situational%2 0awareness%20contract, updated on 26/08/2009, checked on 18/06/2012. General Dynamics UK (2010): Application of the Dynamic Systems Development Method in a Complex Project Environment. Helping clear the fog of war. DSDM Consortium. Available online at http://www.dsdm.org/wpcontent/uploads/2011/02/Improving-Outcomes-Through-Agile-ProjectManagement.pdf, updated on 10/04/2010, checked on 18/06/2012. Henson, Stuart; Prior, Jon (2009): UK MOD Combat Identification Server (CIDS) Technology Demonstrator Programme - Presentation. UK MoD Defence Equipment and Support. International Data Links Symposium 2009 (IDLS2009). Available online at http://idlsoc.com/Documents/Symposiums/IDLS2009/Day1/D1_MAIN_Combat_Ide ntification_Server_Mr_Henson_Programme_Director_TDLs_MOD_UK.pdf, updated on 12/08/2009, checked on 18/06/2012. Madahar, Bob (2012): Open to ideas (Defence Management Journal, 49). Available online at http://www.defencemanagement.com/article.asp?id=399&content_name=ICT&artic le=12608, updated on 18/06/2012, checked on 18/06/2012. Ministry of Defence (2004): Board of Inquiry Report into the death of the late LCpl of Horse Matthew Richard Hull. UK Army. Available online at http://www.mod.uk/NR/rdonlyres/887DE696-1DB9-4512-AF8E2ECFED455356/0/boi_lcpl_hull.pdf, updated on 21/02/2006, checked on 18/06/2012. saarelainen, tapio (2011): Enhancing Situational Awareness by Means of Combat-ID to Minimize Fratricide and Collateral Damage in the Theater. ICDT 2011 : The Sixth International Conference on Digital Telecommunications, updated on 7/11/2011, checked on 18/06/2012.
13
Williams, Rachel; Hodgson, Martin (2009): MoD launches friendly fire investigation into deaths of two British soldiers in Afghanistan. The Guardian. London. Available online at http://www.guardian.co.uk/politics/2009/jan/17/mod-friendly-fire, checked on 18/06/2012. Winston W Royce (1970): Managing the Development of Large Software Systems. In : Proceedings, IEEE WESCON, pp. 19. Available online at http://www.cs.umd.edu/class/spring2003/cmsc838p/Process/waterfall.pdf.
14