Click here to visit the BCS website Click here for our 'Home' page
Facebook Facebook | LinkedIn LinkedIn | Twitter Twitter
How to Run a Successful Offshoring Engagement
Karim Hyatt FBCS CITP CEng MIoD, Pantheon Management
The word 'offshore' conjures up the promise of affordable development resources, but also of deadlines missed, communication nightmares and low quality software and, as a result, missed budgets and late releases. Based on his 10 years’ experience in running product development in a variety of countries, Karim Hyatt looked at effective and proven strategies to make sure your Indian, Chinese or Far East engagement is successful, and crucially what the correct motivation should be to 'go offshore'.

Agility and Offshoring: using Scrum on a dispersed project
Bob Hughes, Principal Lecturer, University of Brighton
Agile approaches such as Scrum and XP are reported to be able to deliver spectacular productivity in software projects. However, offshored development promises lower cost development but seems to need more conventional 'waterfall' types of project management. In this presentation, IT project management specialist Bob Hughes surveyed some of the successful merging of the two strategies. He discussed in detail the conduct of a project where developers were in the UK, but the customers - including the Scrum product owner - were in Australia. There was a brief overview of Scrum and a discussion of how the use of Scrum (and other agile approaches) is modified to meet the needs of individual projects. A Powerpoint version of this presentation is available.

The Advanced Persistent Threat and Social Engineering
Peter Wood, Chief of Operations, First Base Technologies
Sometimes it seems like criminals always have the upper hand. No matter what we do or how much we spend they still steal our data, credit cards and identities. How does this happen? It’s because criminals think 'outside the box' - looking for a back door or hidden weakness. It’s time we learned how to build our defences on the same basis, by using our imagination as well as technology. We must examine and test our systems, buildings and people as though we were a criminal, not a developer or architect. World-renowned security evangelist Peter Wood showed how criminal hackers think, and offered ideas for defending against them. A PDF version of this presentation is available.

Time and Place
Unless otherwise stated, we meet at the Chichester 1 Lecture Theatre, University of Sussex. Complimentary refreshments are available from 7:00pm, and our presentations start at 7:30pm. Free admission. Non-members welcome.

Events Diary
Choose a year to see a synopsis of our past or future events. You will also find handy links to further information for many of our previous presentations.

Mailing List
If you are not a member of our branch but want to be notified of our forthcoming events, you can join our free mailing list. We will not use your email address for any other purpose or share it with third parties. You will be able to opt out at any time.

Site Map | Maintained by Steven Ward