Blog
Sharing insights, knowledge and expertise
Lean Portfolio Management Blog Series Part 2: Strategic Alignment
Strategies for shifting from “imitation LPM” to “real LPM.” In the previous installment of this blog series we…
Lean Portfolio Management Blog Series Part 4: Tooling
In the previous articles in this series, we’ve discussed the dangers of “imitation” lean portfolio management (LPM), the steps required…
Lean Portfolio Management Blog Series Part 3: Organizing for Value
Organizing teams to shift from “imitation LPM” to “real LPM.” In the previous installment of this blog series,…
Lean Portfolio Management Blog Series Part 1: An Overview
An overview on shifting from "imitation LPM" to "real LPM." Lean Portfolio Management (LPM) is supposed to be…
Agile Transformation Strategy – Top down or bottom up?
Over the past couple of years, I have worked with a variety of organizations to help them adopt Agile practices.…
Agile and DevOps – Which Scaled Agile Framework Works Best?
If you are already running Agile/DevOps teams, sooner or later, you will reach a fork in the road where you…
The Failure Files: Tooling Driven Business Process
Part 1: The Risk of Leaving People Out of Your Digital Transformation Check out our infographic on "The Top 6…
SAFe® In a Nutshell – Portfolio Level
In the previous installment, we explored how to scale from a program to the large solution level which is used…
Which One Should You Choose: A Ready-Made or Custom Fleet Management System?
Anyone that operates a transportation or logistics company has to manage multiple vehicles and this can be very time-consuming. With…
What User Acceptance Testing (UAT) Is and Is Not
It's time to dive into the mysteries of user acceptance testing (UAT). In this short post, we'll talk about what…
DevOps Metrics that Actually Matter
Recently, I have been working with several teams to help them with metrics. It seems that metrics are one of…
How to Follow a Standardized Approach to Automotive Cybersecurity Engineering
Connected cars are changing the driving experience today. But how to manage all concerns with the cybersecurity risks? Moreover, you…