Phillip A. Laplante's Antipatterns: Identification, Refactoring, and Management PDF

By Phillip A. Laplante

ISBN-10: 0849329949

ISBN-13: 9780849329944

AntiPatterns: id, Refactoring, and administration catalogs forty eight undesirable administration practices and environments universal to software program improvement, IT, and different organisations. The authors disguise antipatterns of administration, in addition to environmental/cultural antipatterns and character antipatterns/phenotypes. during the category of those damaging practices, it is possible for you to to properly establish difficulties on your personal paintings atmosphere, and take motion to right them.

The authors follow their vast paintings and consultative adventure, in addition to the adventure of the various pros that they have got recognized. This process ends up in a practical remedy of antipattern strategies. Written for a large viewers of practitioners, the authors stay away from a scholarly sort, as a substitute infusing the textual content with enjoyable “gadgets,” together with rambunctious and ribald sidebars, cartoons, tales, and jokes, in addition to names for his or her antipatterns which are right now visible, iconic, funny, and noteworthy.

Following introductory fabric describing a few administration idea and the way people behave separately and in teams, the textual content offers the catalog of administration and environmental antipatterns. The booklet then deals normal recommendation on overcoming undesirable practices via profitable interplay with consumers, shoppers, friends, supervisors, and subordinates.

Show description

Read or Download Antipatterns: Identification, Refactoring, and Management (Auerbach Series on Applied Software Engineering) PDF

Similar information management books

Get Handbook on the Knowledge Economy PDF

Even supposing there are various figures in company and govt who've been tasked with being wisdom managers and information policymakers, the editors (of the U. of Queensland company college and Queensland U. of expertise, Australia) think that there's a dearth of realizing of the underlying theoretical and sensible problems with wisdom administration and coverage.

Hacking the human: social engineering techniques and - download pdf or read online

Details safeguard is ready humans, but in such a lot corporations security continues to be involved in technical countermeasures. The human aspect is essential within the majority of profitable assaults on structures and attackers are infrequently required to discover technical vulnerabilities, hacking the human is generally enough.

New PDF release: Semantic Knowledge Management: An Ontology-based Framework

The big volume of knowledge, details, and data on hand in electronic shape on the net or in the organizational wisdom base calls for a greater approach to keep watch over it. The Semantic internet and its growing to be complexity calls for a source for the certainty of right instruments for administration. Semantic wisdom administration: An Ontology-Based Framework addresses the Semantic net from an operative standpoint utilizing theoretical methods, methodologies, and software program functions as leading edge strategies to actual wisdom administration.

Leadership: All You Need To Know - download pdf or read online

Management successes and screw ups are within the media on a daily basis. we're in an international political and fiscal challenge that is altering how we predict approximately our lives and our futures. The authors current a management version for the longer term which creates the ideal stipulations for individuals to thrive, separately and jointly, and accomplish major pursuits.

Extra info for Antipatterns: Identification, Refactoring, and Management (Auerbach Series on Applied Software Engineering)

Example text

Tom: I just want you to fix it. Sue: Yes, but first I need you to… Tom (louder, and sarcastically): You’re the help desk person, I’m the accountant. I don’t ask you to help me cut your paycheck, so don’t ask me to help you fix my problem. and so on…) ᭡ Exploders are difficult to deal with because they do not want to listen. The way to handle exploders is as follows. First, do not let them interrupt you. Politely use the same strategy for interruption you used with the Sherman Tank. Second, try to help them understand what is making them unhappy.

Consider the refactored encounter: ᭢ Bill: Hey Mike! How are you doing? Mike: Not good. I have a problem … you! 24 Ⅲ Antipatterns: Identification, Refactoring, and Management Bill (nervously): What do you mean? Mike: I understand that you were badmouthing me to Sue. Bill: No I didn’t; we were just talking at lunch… Mike (louder): BS! Sam overheard your conversation and he told me… Bill: Excuse me, Mike, but I was talking. Sam didn’t hear correctly. I was defending you to Sue. What I told her was that I thought it was not your fault that we were delayed and that it was because the operating system was constantly crashing on us… Mike: I didn’t realize; um, um, thank you very much for sticking up for me.

After a year, the Mother Superior calls in the young nun, Sister Mary, for her annual evaluation. The Mother Superior compliments Sister Mary on her wonderful work over the past year and offers, as a reward, to allow her to speak one sentence. “My room is cold,” Sister Mary complains. After reminding her that the order takes a vow of poverty as well as a vow of silence, the Mother Superior sends Sister Mary away. The following year, during her annual review, Sister Mary is again rewarded for outstanding service with two sentences to speak.

Download PDF sample

Antipatterns: Identification, Refactoring, and Management (Auerbach Series on Applied Software Engineering) by Phillip A. Laplante

by John

Rated 4.35 of 5 – based on 17 votes