Category Archives: DevOps

Citizen Developers from City Dwellers to Townsmen

Citizen Development City Dweller to Townsmen

Evolving Citizen Developers from City Dwellers to Townsmen … so they can become first class citizen

Citizen developers have triggered a new left-shift in the application development.

With the introduction of DevXOps, in its multitude of variations DevSecOps, DevBizOps, DevDataOps … we have seen a first shift toward putting more responsibilities with the developers of applications. The idea that, if we consider security, usability, manageability, operability, monitorability, business value and other *-abilities as quality attributes from the get-go of the development process and not wait till applications get into production, resulted in new application life cycle management (ALM) processes. ALM processes that focus on continuous testing, continuous integration, continuous deployment, continuous feedback, continuous monitoring and continuous operations (7 C’s op DevOps). New ALM processes that support this left-shift from operations to development and can even exonerate developers from these additional responsibilities.

Low-code platforms targeted initially developers with the promise of acceleration introducing the concept of Rapid Application Development (RAD). Using drag and drop features to create UI’s; visual wizards to add business logic for validation and other business rules into applications; and schema generation to expose data to applications all resulted in faster time-to-market of IT solutions.

After the introduction of low-code (L-C) platforms, a new group developers raised to the occasion. Tech savvy business users started to use the same L-C platforms to solve day-to-day problems that could not be picked up quickly by IT departments through traditional or rapid application development. The citizen developer was born. At the beginning this was done covert and resulted in shadow-it. When L-C platforms evolved towards no-code (N-C) capabilities, the need for governing this new group of developers became apparent. This resulted in a second left-shift, now from pro-developers to citizen developers. Also here, responsibilities shifted and this time across the IT – Business chasm.

What are these responsibilities that landed in the laps of the Citizen Developers?

Typically we see first the same responsibilities be shifted, that were apparent already in the first left-shift, from operation to pro-developers. These are mostly IT related risks:

  • ALM risks: keeping the application up to date through evolving the requirements, architecture and technology of the application to protect against functional obsoleteness and technical debt.
  • Security Risks: keeping the application secure and protect against incorrect access, usage and data exposure.
  • Costs Risks: baring the cost of the application and protect against inefficient and uncontrolled spending
  • Governance Risks: ensure the application is managed as part of a solution architecture landscape

Typically when Citizen Development matures, we see that also business related risk become visible. These should be part of the responsibility shift as well. These Business related risks are:

  • Strategic Risks: Citizen developer’s focus limited to ad-hoc problem solving i.e. operational problems, forgetting about tactical and strategic long-term solutions. Missed opportunities towards generalization and standardization of solutions leading to redundancy/duplication: excess costs and limited scaling.
  • Process Risks: Citizen developer’s focus on a part of a business process (one or more activities) resulting in sub-optimal solutions. Automating an inefficient process or part of a process results in an automated inefficiency. It requires an end-to-end process view and level of abstraction beyond the problem at hand to create efficient solutions.
  • Obsolesce Risks: Citizen developers applying a technology because they can, not because it is the right thing to do: “If you have a hammer everything looks like a nail“. Limited critical reflection on why and when to apply a technology. Lack of understanding of correct usage and limitation of a technology.  
  • Regulatory Risks: Citizen developers’ focus solely on the business process forgetting about regulatory compliance e.g. data usage (GDPR, data privacy) and security (data leakage and data loss). Limited understanding of requirements beyond functional requirements omitting domain and non-functional requirements. Limited accountability toward end-to-end process and compliance of activities part of an end-to-end process.

Most of these risks are managed from within a modern L-C /N-C platform through tooling and monitoring. These are basically where the platforms turn shadow-it into business managed solutions. The business risks are often underexposed in these platforms and managed by means of on-boarding checklists, ideation repositories and usage monitoring.

The latter typically requires a strategy and governance added on top what these platforms can offer. The platform is a means to the end but cannot exonerate an organization of all the responsibilities that were shifted to the Citizen Developers.

It is the tooling support of the L-C/N-C platforms
that evolve Citizen Developers from City Dwellers to Townsmen.

It is the organization’s (city) strategy and tactical focus
that turns them into first class citizens.

The strategy and tactics will ensure that the minimal conditions are created for Citizen Development success. Typically we see 3 prerequisites for the success, the so-called D^3 i.e. Data, Devices and Delivery

Data: data encapsulation/exposure is a prerequisite


For a Citizen Developer to develop applications for his business,
he needs access to his business data

  • Data source isolation: data specific for his business
  • Data availability: data accessible through API’s
  • Data storage: data to be stored in relation to his application

Devices: suitable devices are a prerequisite


For a Citizen Developer to build applications,
he needs to be able to select a suitable device for the problem at hand
i.e. desktop, mobile, VR-AR, kiosk

  • Device availability: devices made available on short-term to all the users of his application
  • Device/License sharing:  devices and licenses ad-hoc attributed and revoked to users
  • Device security policies: devices are managed to protect against exposure and loss of business data

Delivery (Deployment): platform governance and strategy is a prerequisite


For a Citizen Developer to manage the life cycle of his application,
he needs to be able to count on supporting process to be in place

  • Application Delivery TOM/SOM: application delivery processes clearly describe roles and responsibilities for Business and IT
  • Delivered Application Support Model: delivered application he can support directly or indirectly
  • Application DevSecOps policies: business risks and IT risks are controlled by DevSecOps tooling

How Agile is your Organization?

Maximum flexibility requires maximum responsibility!

Being Agile as an organization and Agile application delivery has been on the radar of many CIO’s and CTO’s trying to reduce the time to market of systems under their control.  Often I see agility being interpreted by the other C-levels as a methodology for maximum project flexibility. However maximum flexibility requires maximum responsibility to achieve business value and that is not a solely technical issue, on the contrary!

Being effective in Agile delivery requires a lot of maturity in different areas during project delivery. We will be looking at six axes besides the typical technical one:

  1. Technical Environment
  2. Quality Management
  3. User Experience
  4. Team Dynamics
  5. Ownership Management
  6. Project Management
  7. Company’s Eco-System

To generate maximum value, the Agile methodology has guiding principles and these have to be translated in operating procedures. Based on earlier work of M. Balbes, we propose a model to quantify this operational effectiveness by scoring a list of required capabilities according to maturity going from no capabilities to innovating and leading capabilities.

An Excel version to score your organization can be downloaded here:

Before we try to measure something, what are the Agile principles companies should adhere to?

  1. Delivery Value: Focus on continuously delivery value to the customer, key-users …
  2. Embrace Change: Change is good and inevitable. Change avoids waste by adapting before it is too late.
  3. Business + ICT: Avoid Chinese walls between teams. Work closely together every day.
  4. Simplicity: Focusing on what is good enough to avoid gold-plating. Work smarter not harder.
  5. Frequent Delivery: Delivery version frequently to have short feedback cycles.
  6. Self-Organizing Teams: Motivated individuals will be able to identify how to organize the work and what they need.
  7. Communication: Transparent, open and face-to-face communication helps insights and clear understanding.
  8. Self-Emerging: Avoid analysis-paralysis and big design up-front. Design for what is needed now and adapt.
  9. Progress Monitoring: Measure progress as delivered software i.e. potential shippable product increments.
  10. Constant Pace: The team should work according at a pace they can keep up without feeling pressured.
  11. Technical Excellence: Focus on the quality of artefacts and development process.
  12. Continuous Improvement: Be self-reflective and make incremental improvements to the development process.

For the different axes an organization needs to have some capabilities in place and below some examples of these capabilities. The detailed list can be found in the attached Excel model.

Technical Environment capabilities check if the principles of extreme programming are enabled. What is the company’s maturity for following capabilities:

  • Unit testing, test driven development and technical testing approaches
  • Continuous integration methods
  • Pair programming – Spikes experimentation
  • Source control – Branching strategy approaches
  • Release management
  • Coding standards usage
  • Development process – Software Development Life Cycle
  • Shared code ownership
  • Software changeability enablement

Quality Management validates if quality assurance is taken in favor of quality measurement. What is the company’ maturity for following capabilities:

  • Quality management process
  • Code Quality – Internal – External Quality impact analysis
  • Team’s  ownership of quality
  • Defect management
  • User acceptance testing – Exploratory testing

User Experience looks at the application of multi-disciplinary teams since developers are not designers. What is the company’s maturity for following capabilities:

  • Graphical Design – UX selection process
  • Embedded usability testing

Team Dynamics focuses how people collaborate and how self-reflective they are. What is the company’s maturity for following capabilities:

  • Team Structure – Charter agreements
  • Team discussion – Conflict resolution processes
  • Retrospectives – Stand-Ups organizations
  • Information radiators availability
  • Continuous improvements
  • Change acceptance process

Ownership Management goal is to see how well the link between business and IT is managed to enhance a project’s business value. What is the company’ maturity for following capabilities:

  • Identified stakeholders management
  • User stories – Story sizing principles
  • Acceptance criteria – Owner acceptance process
  • Delivering value – User feedback management
  • Prioritization – Backlog – Release Cadence organization
  • Backlog – Change management

Project Management looks for transparency in reporting and collaboration enhancement. What is the company’s maturity for following capabilities:

  • Kaban – Milestones overview
  • Decisions – Meeting minutes creation
  • Staffing alignment

Finally we have the company’s Eco-System or the environment. What is the company’s maturity for following capabilities:

  • Risk Identification – Monitoring – Mitigation
  • Embedded learning culture
  • Change – Champions creation and management
  • Governance – Internal Change – External Change management

An overview presentation can be downloaded here:

Cloud Target Operating Models are a perquisite to drive Cloud Adoption!

We often see companies moving to the cloud for the sake of not losing to the competition reversing the question “technology searches problem to solve” in stead of “business problem searches technology to be supported”.

Cloud computing can be an answer to a business question and has a lot of advantageable properties if it is aligned with a digital transformation vision. Hence Business-ICT alignment is key to make this happen. So the logical steps would be:

  1. Come with a Digital Strategy first.
  2. Translate the strategy into an Target Operating Model (TOM) for your business.
  3. Deduce a Cloud Strategy from the Digital Strategy
  4. Translate the Cloud Strategy into a Cloud Target Operating Model (CTOM)

Doing some literature research and looking into the publications of Enamul Haque, I created an overview slide deck with a focus on Business-ICT alignment for cloud computing.

You can download the deck here:

The content first focusses on where cloud computing fits within a digital transformation. Digital transformation is driven by a customer focus and on allowing continuous business changes. Next the following questions are answered: 1. What technologies and prediction are fitting with these drivers? 2. What are key success factors and challenges of a digital transformation? Finally the reasons behind a digital strategy are discussed.

In a second part the focus is on cloud computing. We start with the business drivers and technology drivers and next discus some benefits and challenges. In order to fit cloud as a technology within any company it must be supported by a cloud adoption framework in order to live up to its full protentional.

The final part of the slide deck focuses on the CTOM where the adoption is initiated by a Cloud Center of Expertise (CCoE) delivering the processes for Cloud Service Management and Cloud Operations Management regulated through Cloud Governance.

Cloud Target Operating Model is based on four processes:

  • Plan: Strategy to Portfolio (S2P)
  • Build: Requirement to Deploy (R2S)
  • Fulfil: Request to Fulfil (release/delivery) (R2F)
  • Run: Detect to Correct (R2D)

Tearing Down the Application Development Fortress

A plea for multi-disciplined development teams

Introduction

Creating applications is a multi-skill effort that comes with a set of challenges. For an average sized application there are 5 skills involved:

  • Graphical design
  • Business analysis
  • Application development
  • Software testing
  • System operations

… not even taken into account other stakeholders like end-users, DBA’s, enterprise architects, security officers, project and program managers, change management, user experience design …

Continue reading