Suche senden
Hochladen
Scaling Agile using SAFe by Priyank Pathak
•
0 gefällt mir
•
523 views
Priyank Pathak
Folgen
Scaling Agile using SAFe by Priyank Pathak
Weniger lesen
Mehr lesen
Technologie
Melden
Teilen
Melden
Teilen
1 von 9
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Scrum Bangalore 13th meet up 13 june 2015 - aritha causing the mindset change...
Scrum Bangalore 13th meet up 13 june 2015 - aritha causing the mindset change...
Scrum Bangalore
Development-Testing Methodologies
Development-Testing Methodologies
Christopher J. Scharer
Growing great (agile) teams
Growing great (agile) teams
Jesse Houwing
ChangeInMindset-PMIATLAgile-08192014
ChangeInMindset-PMIATLAgile-08192014
Sameer Bendre
Agile foundations for developers
Agile foundations for developers
Tiffany Jachja
Scaling up your R&D group
Scaling up your R&D group
Avi Wortzel
Journey from Project Organization to a SAFe Company
Journey from Project Organization to a SAFe Company
Toivo Vaje
Scaling Agile
Scaling Agile
Schezarnie Racip
Empfohlen
Scrum Bangalore 13th meet up 13 june 2015 - aritha causing the mindset change...
Scrum Bangalore 13th meet up 13 june 2015 - aritha causing the mindset change...
Scrum Bangalore
Development-Testing Methodologies
Development-Testing Methodologies
Christopher J. Scharer
Growing great (agile) teams
Growing great (agile) teams
Jesse Houwing
ChangeInMindset-PMIATLAgile-08192014
ChangeInMindset-PMIATLAgile-08192014
Sameer Bendre
Agile foundations for developers
Agile foundations for developers
Tiffany Jachja
Scaling up your R&D group
Scaling up your R&D group
Avi Wortzel
Journey from Project Organization to a SAFe Company
Journey from Project Organization to a SAFe Company
Toivo Vaje
Scaling Agile
Scaling Agile
Schezarnie Racip
Deliver Double the Value in Half the Time
Deliver Double the Value in Half the Time
David Hawks
Make the Switch to Learner centered Experiences
Make the Switch to Learner centered Experiences
Allen Partridge
Choosing Modeling Techniques
Choosing Modeling Techniques
Global Knowledge Training
Is Java ready for carrier-grade applications?
Is Java ready for carrier-grade applications?
Impetus Technologies
COM 620 Module 4
COM 620 Module 4
Walter Ratliff
BSAD 340 Spring 2017 - CH 6
BSAD 340 Spring 2017 - CH 6
Janice Robinson
Designing with Everybody
Designing with Everybody
Matthias Langholz
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
Yuval Yeret
The Key to the SAFe: Principles over Practices
The Key to the SAFe: Principles over Practices
Em Campbell-Pretty
Razorfish university slide_share
Razorfish university slide_share
Reva McPollom
Managing effective Innovation
Managing effective Innovation
Michel Sérié
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
IT Arena
A Pragmatic Guide to Design Thinking
A Pragmatic Guide to Design Thinking
Matthias Langholz
Transition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the Desk
Cynthia Clay
Tim Arthur: "Unorthodox Agile"
Tim Arthur: "Unorthodox Agile"
RedHatAgileDay
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
Ken Rubin
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
Yuval Yeret
The Mobile Learning Tipping Point
The Mobile Learning Tipping Point
Allen Partridge
BSAD 340 Spring 2017 - CH 10
BSAD 340 Spring 2017 - CH 10
Janice Robinson
Rauch delighting mobile customers with content for apps, videos, and a social...
Rauch delighting mobile customers with content for apps, videos, and a social...
Marta Rauch
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Weitere ähnliche Inhalte
Ähnlich wie Scaling Agile using SAFe by Priyank Pathak
Deliver Double the Value in Half the Time
Deliver Double the Value in Half the Time
David Hawks
Make the Switch to Learner centered Experiences
Make the Switch to Learner centered Experiences
Allen Partridge
Choosing Modeling Techniques
Choosing Modeling Techniques
Global Knowledge Training
Is Java ready for carrier-grade applications?
Is Java ready for carrier-grade applications?
Impetus Technologies
COM 620 Module 4
COM 620 Module 4
Walter Ratliff
BSAD 340 Spring 2017 - CH 6
BSAD 340 Spring 2017 - CH 6
Janice Robinson
Designing with Everybody
Designing with Everybody
Matthias Langholz
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
Yuval Yeret
The Key to the SAFe: Principles over Practices
The Key to the SAFe: Principles over Practices
Em Campbell-Pretty
Razorfish university slide_share
Razorfish university slide_share
Reva McPollom
Managing effective Innovation
Managing effective Innovation
Michel Sérié
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
IT Arena
A Pragmatic Guide to Design Thinking
A Pragmatic Guide to Design Thinking
Matthias Langholz
Transition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the Desk
Cynthia Clay
Tim Arthur: "Unorthodox Agile"
Tim Arthur: "Unorthodox Agile"
RedHatAgileDay
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
Ken Rubin
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
Yuval Yeret
The Mobile Learning Tipping Point
The Mobile Learning Tipping Point
Allen Partridge
BSAD 340 Spring 2017 - CH 10
BSAD 340 Spring 2017 - CH 10
Janice Robinson
Rauch delighting mobile customers with content for apps, videos, and a social...
Rauch delighting mobile customers with content for apps, videos, and a social...
Marta Rauch
Ähnlich wie Scaling Agile using SAFe by Priyank Pathak
(20)
Deliver Double the Value in Half the Time
Deliver Double the Value in Half the Time
Make the Switch to Learner centered Experiences
Make the Switch to Learner centered Experiences
Choosing Modeling Techniques
Choosing Modeling Techniques
Is Java ready for carrier-grade applications?
Is Java ready for carrier-grade applications?
COM 620 Module 4
COM 620 Module 4
BSAD 340 Spring 2017 - CH 6
BSAD 340 Spring 2017 - CH 6
Designing with Everybody
Designing with Everybody
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
SAFe – A dangerous weapon. Techniques to implementing a lasting adoption of t...
The Key to the SAFe: Principles over Practices
The Key to the SAFe: Principles over Practices
Razorfish university slide_share
Razorfish university slide_share
Managing effective Innovation
Managing effective Innovation
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
A Pragmatic Guide to Design Thinking (Matthias Langholz Product Stream)
A Pragmatic Guide to Design Thinking
A Pragmatic Guide to Design Thinking
Transition to Management: The Other Side of the Desk
Transition to Management: The Other Side of the Desk
Tim Arthur: "Unorthodox Agile"
Tim Arthur: "Unorthodox Agile"
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
Economically Sensible Scrum -- Scrum Gathering New Orleans 2014
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
SAFe – A dangerous weapon: Techniques for implementing a lasting adoption of ...
The Mobile Learning Tipping Point
The Mobile Learning Tipping Point
BSAD 340 Spring 2017 - CH 10
BSAD 340 Spring 2017 - CH 10
Rauch delighting mobile customers with content for apps, videos, and a social...
Rauch delighting mobile customers with content for apps, videos, and a social...
Kürzlich hochgeladen
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Kürzlich hochgeladen
(20)
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Scaling Agile using SAFe by Priyank Pathak
1.
© 2014 www.innovationroots.com;
All Rights Reserved. SCALING AGILE using SAFe -Challenges INNOVATION ROOTS Agile Coach Email: priyank@innovationroots.com Twitter:@priyankdk
2.
© 2014 www.innovationroots.com;
All Rights Reserved. Scaling Agile.. What are your experiences? 5 min
3.
© 2014 www.innovationroots.com;
All Rights Reserved. SAFe
4.
© 2014 www.innovationroots.com;
All Rights Reserved.
5.
© 2014 www.innovationroots.com;
All Rights Reserved. Scaling Agile..using SAFe Lets discuss few of the challenges today based on my experience … Key Challenges
6.
© 2014 www.innovationroots.com;
All Rights Reserved. Alignment E F S T T Value Stream Mapping Vision & Goals Roadmaps
7.
© 2014 www.innovationroots.com;
All Rights Reserved. Synchronization Iterate Iterate Iterate Iterate Iterate Iterate Release PI Iterate Iterate Iterate Iterate Iterate Iterate Release PI Iterate Iterate Iterate Iterate Iterate Iterate Release PI Common ART Cadence CI/CD Single Backlog PI Goals
8.
© 2014 www.innovationroots.com;
All Rights Reserved. Dependencies Program Boards Sequencing WSJF Single Backlog PI Goals > Team Goals ART SOS
9.
© 2014 www.innovationroots.com;
All Rights Reserved. Thank you
Jetzt herunterladen