Home > On-Demand Archives > Talks >

Attack IoT System Unknowns with Tracer Bullets

James Grenning - Watch Now - EOC 2020 - Duration: 34:49

Attack IoT System Unknowns with Tracer Bullets
James Grenning

You have a product idea for using IoT technologies! You have an awesome greenfield development opportunity! Congratulation! You start staring at that clean sheet, that blank page. There are more unknowns than knowns! It's getting scary. What should you do?

This talk is the story of starting a greenfield IoT project. You see there are risks. You are attracted to the familiar tasks. If you defer risks, saving them until the end, it won't end well. In this story we'll look at identifying risks and attacking them directly with tracer bullets, building a walking skeleton of the product. The tracer bullets give you insight on a solution to your technical problem. The walking skeleton helps prove your product concept and demonstrate your ability to deliver it. You'll look at how to make progress with off-the-shelf hardware and software without becoming overly dependent on any vendor.

M↓ MARKDOWN HELP
italicssurround text with
*asterisks*
boldsurround text with
**two asterisks**
hyperlink
[hyperlink](https://example.com)
or just a bare URL
code
surround text with
`backticks`
strikethroughsurround text with
~~two tilde characters~~
quote
prefix with
>

Oliver
Score: 0 | 3 years ago | no reply

Thanks for your great presentation. I liked perticularly how you shared your thoughts on the risks throughout the project. Now that I saw your talk I think on my next project I will try to visualize the ongoing risks better.

Doini
Score: 0 | 4 years ago | no reply

Thank you for the great presentation!

jwgrenningSpeaker
Score: 0 | 4 years ago | no reply

if you use twitter, you can tweet reactions to @jwgrenning

OUR SPONSORS

OUR PARTNERS