1,808 research outputs found

    Historical roots of Agile methods: where did “Agile thinking” come from?

    No full text
    The appearance of Agile methods has been the most noticeable change to software process thinking in the last fifteen years [16], but in fact many of the “Agile ideas” have been around since 70’s or even before. Many studies and reviews have been conducted about Agile methods which ascribe their emergence as a reaction against traditional methods. In this paper, we argue that although Agile methods are new as a whole, they have strong roots in the history of software engineering. In addition to the iterative and incremental approaches that have been in use since 1957 [21], people who criticised the traditional methods suggested alternative approaches which were actually Agile ideas such as the response to change, customer involvement, and working software over documentation. The authors of this paper believe that education about the history of Agile thinking will help to develop better understanding as well as promoting the use of Agile methods. We therefore present and discuss the reasons behind the development and introduction of Agile methods, as a reaction to traditional methods, as a result of people's experience, and in particular focusing on reusing ideas from histor

    Gender, war and militarism: making and questioning the links

    Get PDF
    The gender dynamics of militarism have traditionally been seen as straightforward, given the cultural mythologies of warfare and the disciplining of ‘masculinity’ that occurs in the training and use of men's capacity for violence in the armed services. However, women's relation to both war and peace has been varied and complex. It is women who have often been most prominent in working for peace, although there are no necessary links between women and opposition to militarism. In addition, more women than ever are serving in many of today's armies, with feminists rather uncertain on how to relate to this phenomenon. In this article, I explore some of the complexities of applying gender analyses to militarism and peace work in sites of conflict today, looking most closely at the Israeli feminist group, New Profile, and their insistence upon the costs of the militarized nature of Israeli society. They expose the very permeable boundaries between the military and civil society, as violence seeps into the fears and practices of everyday life in Israel. I place their work in the context of broader feminist analysis offered by researchers such as Cynthia Enloe and Cynthia Cockburn, who have for decades been writing about the ‘masculinist’ postures and practices of warfare, as well as the situation of women caught up in them. Finally, I suggest that rethinking the gendered nature of warfare must also encompass the costs of war to men, whose fundamental vulnerability to psychological abuse and physical injury is often downplayed, whether in mainstream accounts of warfare or in more specific gender analysis. Feminists need to pay careful attention to masculinity and its fragmentations in addressing the topic of gender, war and militarism

    Work restructuring and changing craft identity: the Tale of the Disaffected Weavers (or what happens when the rug is pulled from under your feet)

    Get PDF
    This article explores the changes in worker identity that can occur during manufacturing restructuring – specifically those linked to the declining status of craft work – through an in-depth case study of Weaveco, a UK carpet manufacturer. An analysis of changes in the labour process is followed by employee reactions centred on the demise of the traditional craft identity of male carpet weavers. The voices of the weavers dramatize the tensions involved in reconstructing their masculine identity, and we consider the implications this has for understanding gendered work relations

    Probabilistic analysis of the upwind scheme for transport

    Full text link
    We provide a probabilistic analysis of the upwind scheme for multi-dimensional transport equations. We associate a Markov chain with the numerical scheme and then obtain a backward representation formula of Kolmogorov type for the numerical solution. We then understand that the error induced by the scheme is governed by the fluctuations of the Markov chain around the characteristics of the flow. We show, in various situations, that the fluctuations are of diffusive type. As a by-product, we prove that the scheme is of order 1/2 for an initial datum in BV and of order 1/2-a, for all a>0, for a Lipschitz continuous initial datum. Our analysis provides a new interpretation of the numerical diffusion phenomenon

    Entrances and exits: changing perceptions of primary teaching as a career for men

    Get PDF
    Original article can be found at: http://www.informaworld.com/smpp/title~content=t713640830~db=all Copyright Informa / Taylor and Francis. DOI: 10.1080/03004430802352087The number of men in teaching has always been small, particularly in early childhood, but those that do come into teaching usually do so for the same reasons as women, namely enjoyment of working with children, of wanting to teach and wanting to make a difference to children's lives. However, in two separate studies, the authors have shown that on beginning teacher training in 1998, and at the point of leaving the profession in 2005, men and women tend to emphasise different concerns. This article will explore those differences and seek possible explanations for how men's views of teaching might be changing over time.Peer reviewe

    Love, rights and solidarity: studying children's participation using Honneth's theory of recognition

    Get PDF
    Recent attempts to theorize children’s participation have drawn on a wide range of ideas, concepts and models from political and social theory. The aim of this article is to explore the specific usefulness of Honneth’s theory of a ‘struggle for recognition’ in thinking about this area of practice. The article identifies what is distinctive about Honneth’s theory of recognition, and how it differs from other theories of recognition. It then considers the relevance of Honneth’s conceptual framework to the social position of children, including those who may be involved in a variety of ‘participatory’ activities. It looks at how useful Honneth’s ideas are in direct engagement with young people’s praxis, drawing on ethnographic research with members of a children and young people’s forum. The article concludes by reflecting on the implications of this theoretical approach and the further questions which it opens up for theories of participation and of adult–child relations more generally

    A human complement receptor 1 polymorphism that reduces Plasmodium falciparum rosetting confers protection against severe malaria

    Get PDF
    Parasitized red blood cells (RBCs) from children suffering from severe malaria often adhere to complement receptor 1 (CR1) on uninfected RBCs to form clumps of cells known as "rosettes." Despite a well documented association between rosetting and severe malaria, it is controversial whether rosetting is a cause or a correlate of parasite virulence. CR1-deficient RBC show greatly reduced rosetting; therefore, we hypothesized that, if rosetting is a direct cause of malaria pathology, CR1-deficient individuals should be protected against severe disease. In this study, we show that RBC CR1 deficiency occurs in up to 80% of healthy individuals from the malaria-endemic regions of Papua New Guinea. This RBC CR1 deficiency is associated with polymorphisms in the CR1 gene and, unexpectedly, with alpha-thalassemia, a common genetic disorder in Melanesian populations. Analysis of a case-control study demonstrated that the CR1 polymorphisms and alpha-thalassemia independently confer protection against severe malaria. We have therefore identified CR1 as a new malaria resistance gene and provided compelling evidence that rosetting is an important parasite virulence phenotype that should be a target for drug and vaccine development

    Identity and belonging in social learning groups : the importance of distinguishing social, operational and knowledge-related identity congruence

    Get PDF
    Collaborative learning has much to offer but not all learners participate fully and peer groups can be exclusive. The paper examines how belonging or 'congruence' in learning groups is related to identities of gender, age, ethnicity and socio-economic status. A study of student experiences of collaborative learning on three different blended learning courses illustrated how learners negotiate identity congruence with peer groups to belong and engage. An analytical framework that distinguishes social, operational and knowledge-related identity congruence has emerged. Contrary to received wisdom, the social aspect appears least important for learner engagement while knowledge-related identity congruence is fundamental. Some of the consequences of identity incongruence, particularly concerning gender and maturity, are discussed and the paper points towards the pedagogies which might enable identities of group members to shift so that collaborative learning can flourish

    A posteriori error analysis and adaptive non-intrusive numerical schemes for systems of random conservation laws

    Full text link
    In this article we consider one-dimensional random systems of hyperbolic conservation laws. We first establish existence and uniqueness of random entropy admissible solutions for initial value problems of conservation laws which involve random initial data and random flux functions. Based on these results we present an a posteriori error analysis for a numerical approximation of the random entropy admissible solution. For the stochastic discretization, we consider a non-intrusive approach, the Stochastic Collocation method. The spatio-temporal discretization relies on the Runge--Kutta Discontinuous Galerkin method. We derive the a posteriori estimator using continuous reconstructions of the discrete solution. Combined with the relative entropy stability framework this yields computable error bounds for the entire space-stochastic discretization error. The estimator admits a splitting into a stochastic and a deterministic (space-time) part, allowing for a novel residual-based space-stochastic adaptive mesh refinement algorithm. We conclude with various numerical examples investigating the scaling properties of the residuals and illustrating the efficiency of the proposed adaptive algorithm

    Empirical Investigation on Agile Methods Usage: Issues Identified from Early Adopters in Malaysia

    Get PDF
    Agile Methods are a set of software practices that can help to produce products faster and at the same time deliver what customers want. Despite the benefits that Agile methods can deliver, however, we found few studies from the Southeast Asia region, particularly Malaysia. As a result, less empirical evidence can be obtained in the country making its implementation harder. To use a new method, experience from other practitioners is critical, which describes what is important, what is possible and what is not possible concerning Agile. We conducted a qualitative study to understand the issues faced by early adopters in Malaysia where Agile methods are still relatively new. The initial study involves 13 participants including project managers, CEOs, founders and software developers from seven organisations. Our study has shown that social and human aspects are important when using Agile methods. While technical aspects have always been considered to exist in software development, we found these factors to be less important when using Agile methods. The results obtained can serve as guidelines to practitioners in the country and the neighbouring regions
    corecore