SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
© 2014 www.innovationroots.com; All Rights Reserved. 
SCALING AGILE using SAFe -Challenges 
INNOVATION ROOTS 
Agile Coach 
Email: priyank@innovationroots.com 
Twitter:@priyankdk
© 2014 www.innovationroots.com; All Rights Reserved. 
Scaling Agile.. 
What are your experiences? 
5 min
© 2014 www.innovationroots.com; All Rights Reserved. 
SAFe
© 2014 www.innovationroots.com; All Rights Reserved.
© 2014 www.innovationroots.com; All Rights Reserved. 
Scaling Agile..using SAFe 
Lets discuss few of the challenges today based on my experience … 
Key Challenges
© 2014 www.innovationroots.com; All Rights Reserved. 
Alignment 
E 
F 
S 
T 
T 
Value Stream Mapping 
Vision & Goals 
Roadmaps
© 2014 www.innovationroots.com; All Rights Reserved. 
Synchronization 
Iterate 
Iterate 
Iterate 
Iterate 
Iterate 
Iterate 
Release 
PI 
Iterate 
Iterate 
Iterate 
Iterate 
Iterate 
Iterate 
Release 
PI 
Iterate 
Iterate 
Iterate 
Iterate 
Iterate 
Iterate 
Release 
PI 
Common ART Cadence 
CI/CD 
Single Backlog 
PI Goals
© 2014 www.innovationroots.com; All Rights Reserved. 
Dependencies 
Program Boards 
Sequencing WSJF 
Single Backlog 
PI Goals > Team Goals 
ART SOS
© 2014 www.innovationroots.com; All Rights Reserved. 
Thank you

Weitere ähnliche Inhalte

Ähnlich wie Scaling Agile using SAFe by Priyank Pathak

Deliver Double the Value in Half the Time
Deliver Double the Value in Half the TimeDeliver Double the Value in Half the Time
Deliver Double the Value in Half the TimeDavid Hawks
 
Make the Switch to Learner centered Experiences
Make the Switch to Learner centered ExperiencesMake the Switch to Learner centered Experiences
Make the Switch to Learner centered ExperiencesAllen Partridge
 
Is Java ready for carrier-grade applications?
Is Java ready for carrier-grade applications? Is Java ready for carrier-grade applications?
Is Java ready for carrier-grade applications? Impetus Technologies
 
BSAD 340 Spring 2017 - CH 6
BSAD 340 Spring 2017 - CH 6BSAD 340 Spring 2017 - CH 6
BSAD 340 Spring 2017 - CH 6Janice Robinson
 
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...Yuval Yeret
 
The Key to the SAFe: Principles over Practices
The Key to the SAFe: Principles over PracticesThe Key to the SAFe: Principles over Practices
The Key to the SAFe: Principles over PracticesEm Campbell-Pretty
 
Razorfish university slide_share
Razorfish university slide_shareRazorfish university slide_share
Razorfish university slide_shareReva McPollom
 
Managing effective Innovation
Managing effective InnovationManaging effective Innovation
Managing effective InnovationMichel Sérié
 
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)IT Arena
 
A Pragmatic Guide to Design Thinking
A Pragmatic Guide to Design ThinkingA Pragmatic Guide to Design Thinking
A Pragmatic Guide to Design ThinkingMatthias Langholz
 
Transition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the DeskTransition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the DeskCynthia Clay
 
Tim Arthur: "Unorthodox Agile"
Tim Arthur:  "Unorthodox Agile"Tim Arthur:  "Unorthodox Agile"
Tim Arthur: "Unorthodox Agile"RedHatAgileDay
 
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014Ken Rubin
 
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...Yuval Yeret
 
The Mobile Learning Tipping Point
The Mobile Learning Tipping PointThe Mobile Learning Tipping Point
The Mobile Learning Tipping PointAllen Partridge
 
BSAD 340 Spring 2017 - CH 10
BSAD 340 Spring 2017 - CH 10BSAD 340 Spring 2017 - CH 10
BSAD 340 Spring 2017 - CH 10Janice Robinson
 
Rauch delighting mobile customers with content for apps, videos, and a social...
Rauch delighting mobile customers with content for apps, videos, and a social...Rauch delighting mobile customers with content for apps, videos, and a social...
Rauch delighting mobile customers with content for apps, videos, and a social...Marta Rauch
 

Ähnlich wie Scaling Agile using SAFe by Priyank Pathak (20)

Deliver Double the Value in Half the Time
Deliver Double the Value in Half the TimeDeliver Double the Value in Half the Time
Deliver Double the Value in Half the Time
 
Make the Switch to Learner centered Experiences
Make the Switch to Learner centered ExperiencesMake the Switch to Learner centered Experiences
Make the Switch to Learner centered Experiences
 
Choosing Modeling Techniques
Choosing Modeling TechniquesChoosing Modeling Techniques
Choosing Modeling Techniques
 
Is Java ready for carrier-grade applications?
Is Java ready for carrier-grade applications? Is Java ready for carrier-grade applications?
Is Java ready for carrier-grade applications?
 
COM 620 Module 4
COM 620 Module 4COM 620 Module 4
COM 620 Module 4
 
BSAD 340 Spring 2017 - CH 6
BSAD 340 Spring 2017 - CH 6BSAD 340 Spring 2017 - CH 6
BSAD 340 Spring 2017 - CH 6
 
Designing with Everybody
Designing with EverybodyDesigning with Everybody
Designing with Everybody
 
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
 
The Key to the SAFe: Principles over Practices
The Key to the SAFe: Principles over PracticesThe Key to the SAFe: Principles over Practices
The Key to the SAFe: Principles over Practices
 
Razorfish university slide_share
Razorfish university slide_shareRazorfish university slide_share
Razorfish university slide_share
 
Managing effective Innovation
Managing effective InnovationManaging effective Innovation
Managing effective Innovation
 
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
 
A Pragmatic Guide to Design Thinking
A Pragmatic Guide to Design ThinkingA Pragmatic Guide to Design Thinking
A Pragmatic Guide to Design Thinking
 
Transition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the DeskTransition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the Desk
 
Tim Arthur: "Unorthodox Agile"
Tim Arthur:  "Unorthodox Agile"Tim Arthur:  "Unorthodox Agile"
Tim Arthur: "Unorthodox Agile"
 
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
 
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
 
The Mobile Learning Tipping Point
The Mobile Learning Tipping PointThe Mobile Learning Tipping Point
The Mobile Learning Tipping Point
 
BSAD 340 Spring 2017 - CH 10
BSAD 340 Spring 2017 - CH 10BSAD 340 Spring 2017 - CH 10
BSAD 340 Spring 2017 - CH 10
 
Rauch delighting mobile customers with content for apps, videos, and a social...
Rauch delighting mobile customers with content for apps, videos, and a social...Rauch delighting mobile customers with content for apps, videos, and a social...
Rauch delighting mobile customers with content for apps, videos, and a social...
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Scaling Agile using SAFe by Priyank Pathak