Category Archives: Planning

Software Development Methodology

The success of any large, and/or challenging software engineering project depends to a great extent on the use of a software development methodology. Using a well thought out methodology allows an ordered systematic development of the product. It creates a working environment in which each team member can communicate using a vocabulary defined by the methodology. It also facilitates the development in an ordered way with clearly defined stages which can be monitored communicated and managed to produce the end product robustly and efficiently. Continue reading

Dragon’s Den Pitch

Context

It might be blindingly obvious that technology is impacting on every aspect of modern life in most countries. Less obvious thought is the manner in which the world of work is being redefined on an ongoing basis. Automation has for many decades now taken over lower skilled and repetitive tasks while simultaneously creating higher value positions for humans to fill. Over the past decade or so though, the rate of job replacement has increased significantly with machines and software being ever more capable of replacing human workers. It is no wonder then that we see an increasing number of people taking on multiple jobs especially in what is known as the gig economy. Not all digital workers take this route though, with many opting to either take on freelancing for direct clients or venturing into internet marketing. Freelancers in this instance are different from gig workers in that they gain assignments directly from their clients (usually via online communities), typically have substantial experience in the field concerned and earn higher rates per hour. Internet marketers on the other hand, are not old school marketing professionals trying to do online branding. Instead they are self-employed individuals who make some or all of their income, by selling goods and services online.

Continue reading

Functional Requirements Analysis: The Trust Machine

These are an initial set of functional requirements for the Trust Machine. In keeping with Agile software development principles these will be modified and developed on a regular basis throughout all phases of the development as a result of meetings with stakeholders. These meetings should ideally occur on a weekly basis at the very least and will review the requirements as a priority objective at each meeting. Continue reading

International social network communication issues.

As I was going back to China, the team mentioned about social networking used to maintain connection during the Easter Vacation. The first thing comes to our mind was using Facebook. However, when I told that Facebook was blocked in China, they were shocked. ‘Then what social networking platform you have?’ this question came next. Actually, not only Facebook, all the products related to Google are not accessible in China, instead, we get chatting software QQ, Wechat to contact with family members, friends and anyone we already know of or familiar with. We get Weibo to link to people we never meet but we interest in or interest in us. What’s more, BaiduTeiba is a good place for us to post our own opinion to the public and get response from every corner. As China has a large population cardinality, the social networking we use ‘internally’ work for enough users’ supporting. Continue reading

The cost of free feedback

Considering the alternatives:

Easy access to near limitless data is one of the key features of the information age. Unfortunately, this superficial truth belies the complexities of freely obtained data. These may include the quality of the data, the direct applicability thereof, how recent it is, who is providing it or how it was obtained. There are numerous other considerations all of which may impact on a specific data use and whether or not any one consideration is of concern will be highly dependent on the situation being addressed. So for instance, a fashion blogger might make good use of data on the shopping habits of a hand full of celebrities. If however the same dataset was presented to the chief procurement officer of an budget clothing retailer, that information would be far from sufficient for planning the next season’s line-up. Continue reading

There’s a lot at stake(holder)

Further to my recent post on deriving who our target users are, in this blog post I have formulated this into a more ‘formal’ stakeholder analysis.

Later in the blog we will look at some Personas of the stakeholders we have identified. Personas are useful to give realistic, yet totally fictitious, representations to help get inside the mind of the person the system is being designed for. Continue reading

The incumbents

The social network space for online marketers is dominated by two major players, Warrior forum and Blackhatworld. As the names might suggest, these communities do not present themselves as warm and caring spaces but are instead all about doing the best deals, often at any cost. This is not to say that there aren’t helpful individuals participating or that the content is universally suspect, but rather that the pervasive attitude amongst users is one of “trust no one and test everything twice before use”. As anybody with an entrepreneurial background would know, this type of environment is massively inefficient and would necessitate the introduction of checks that go beyond standard due diligence. One quick test yielded a time to implementation for an SEO technique at three times what it would have been had the information come from a different source. Continue reading