{"id":2989,"date":"2019-06-06T23:40:31","date_gmt":"2019-06-06T22:40:31","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=2989"},"modified":"2019-06-07T16:45:58","modified_gmt":"2019-06-07T15:45:58","slug":"montee-en-puissance-des-projets-it-utilisant-les-methodes-agiles","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2019\/06\/06\/montee-en-puissance-des-projets-it-utilisant-les-methodes-agiles\/","title":{"rendered":"Mont\u00e9e en puissance des projets IT utilisant les m\u00e9thodes agiles"},"content":{"rendered":"<p>Le JDNET consacre plusieurs articles int\u00e9ressants sur les m\u00e9thodes agiles. L&#8217;Observatoire 2019 du Comit\u00e9 fran\u00e7ais du test logiciel (CFTL) montre que les m\u00e9thodes agiles (Scrum, Kanban, SAFe, etc.) sont d\u00e9sormais majoritairement utilis\u00e9es. L&#8217;entreprise de services du num\u00e9rique (ESN) Umanis a \u00e9galement produit une \u00e9tude sur les m\u00e9thodes de pilotage et de r\u00e9alisation de projets en mode Agile. Scrum p\u00e8serait quelque 56% de parts de march\u00e9 sur le segment de l&#8217;agilit\u00e9 mono-\u00e9quipe dans le monde, et SAFe 29% sur le terrain de l&#8217;agilit\u00e9 transverse ou multi-\u00e9quipes.<!--more--><\/p>\n<p>En mati\u00e8re de gestion de projet mono-\u00e9quipe, Scrum serait plus adapt\u00e9 \u00e0 la gestion d&#8217;un projet unique tandis que Kanban convient mieux au management de plusieurs projets ou encore \u00e0 la Tierce Maintenance Applicative (TMA) et au Maintien en Condition Op\u00e9rationnelle (MCO). Les m\u00e9thodes Scrum, Kanban et autres telles que Scrumban ou XP sont ad\u00e9quates pour une \u00e9quipe de d\u00e9veloppeurs comprise inf\u00e9rieur \u00e0 10 d\u00e9veloppeurs. Au-del\u00e0, d&#8217;autres m\u00e9thodes comme SAFe sont recommand\u00e9es car elles permettent de cadencer le travail de plusieurs \u00e9quipes en dotant le projet d&#8217;une architecture commune pour faciliter la cr\u00e9ation de passerelles ou de fonctionnalit\u00e9s transverses aux diff\u00e9rents composants.<\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2019%2F06%2FAnnual-State-of-Agile-Report.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2019\/06\/Annual-State-of-Agile-Report.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 2.94Mo)<\/a><\/p>\n<p><a href=\"https:\/\/www.journaldunet.com\/solutions\/dsi\/1424438-les-methodes-agiles-explosent-dans-le-test-logiciel\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.journaldunet.com\/solutions\/dsi\/1424438-les-methodes-agiles-explosent-dans-le-test-logiciel<\/a><\/p>\n<p><a href=\"https:\/\/www.journaldunet.com\/solutions\/dsi\/1419985-comparatif-des-methodes-agiles\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.journaldunet.com\/solutions\/dsi\/1419985-comparatif-des-methodes-agiles\/<\/a><\/p>\n<p><a href=\"https:\/\/explore.versionone.com\/state-of-agile\/versionone-12th-annual-state-of-agile-report\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/explore.versionone.com\/state-of-agile\/versionone-12th-annual-state-of-agile-report<\/a><\/p>\n<p><a href=\"http:\/\/www.cftl.fr\/livre-les-tests-logiciels-en-agile-cftl\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.cftl.fr\/livre-les-tests-logiciels-en-agile-cftl\/<\/a><\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le JDNET consacre plusieurs articles int\u00e9ressants sur les m\u00e9thodes agiles. L&#8217;Observatoire 2019 du Comit\u00e9 fran\u00e7ais du test logiciel (CFTL) montre que les m\u00e9thodes agiles (Scrum, Kanban, SAFe, etc.) sont d\u00e9sormais&hellip; <\/p>\n","protected":false},"author":1,"featured_media":2991,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[74],"tags":[],"class_list":["post-2989","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2019\/06\/livre-cftl-w.jpg?fit=721%2C405&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-Md","jetpack-related-posts":[{"id":2965,"url":"https:\/\/mouillere.com\/universconvergents\/2019\/05\/14\/kit-de-bonnes-pratiques-de-la-cnil-a-destination-des-developpeurs\/","url_meta":{"origin":2989,"position":0},"title":"Kit de bonnes pratiques de la CNIL \u00e0 destination des d\u00e9veloppeurs","author":"Fred","date":"14 mai 2019","format":false,"excerpt":"La CNIL vient de publier un kit des bonnes pratiques \u00e0 appliquer d\u00e8s la conception d\u2019une solution IT (Code, SDK, biblioth\u00e8ques, etc.) selon le principe GDPR de Privacy by Design afin d\u2019am\u00e9liorer la gestion des donn\u00e9es et s\u00e9curiser les projets. https:\/\/www.cnil.fr\/fr\/kit-developpeur Les premi\u00e8res recommandations visent le choix des outils de\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/6640564215_b3dc3f033d.jpg?fit=450%2C287&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6496,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/03\/06\/cloud-cybersecurite-souverainete\/","url_meta":{"origin":2989,"position":1},"title":"Cloud : cybers\u00e9curit\u00e9 &#038; souverainet\u00e9","author":"Fred","date":"6 mars 2025","format":false,"excerpt":"Alors que Microsoft finalise son projet garantissant \u00e0 ses utilisateurs europ\u00e9ens que leurs donn\u00e9es restent localis\u00e9es dans des centres de donn\u00e9es bas\u00e9es dans dans un pays de l'Union europ\u00e9enne ou au sein d'un pays membre de l'association europ\u00e9enne de libre \u00e9change (Suisse, Liechtenstein, Norv\u00e8ge, Islande), ce qui ne devrait pas\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":5369,"url":"https:\/\/mouillere.com\/universconvergents\/2023\/01\/11\/projet-de-traite-sur-la-cybercriminalite\/","url_meta":{"origin":2989,"position":2},"title":"Projet de trait\u00e9 sur la cybercriminalit\u00e9","author":"Fred","date":"11 janvier 2023","format":false,"excerpt":"Plusieurs organisations s'inqui\u00e8tent du projet de trait\u00e9 des Nations Unies sur la cybercriminalit\u00e9 pr\u00e9voyant une liste de crimes li\u00e9s aux contenus sur Internet qui menacerait gravement la libert\u00e9 d'expression, la vie priv\u00e9e et les activit\u00e9s l\u00e9gitimes des journalistes, lanceurs d'alerte, activistes, etc.\u00a0 Ainsi, alors que\u00a0 la d\u00e9sinformation menace la d\u00e9mocratie\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":6789,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/11\/04\/souverainete-des-systemes-dinformation-de-letat\/","url_meta":{"origin":2989,"position":3},"title":"Souverainet\u00e9 des syst\u00e8mes d\u2019information de l\u2019\u00c9tat","author":"Fred","date":"4 novembre 2025","format":false,"excerpt":"Le dernier rapport de la Cour des comptes sur la souverainet\u00e9 des syst\u00e8mes d'information civils de l'\u00c9tat met en lumi\u00e8re un d\u00e9calage persistant entre l'ambition affich\u00e9e par la France en mati\u00e8re de souverainet\u00e9 num\u00e9rique et la r\u00e9alit\u00e9 de sa mise en \u0153uvre face \u00e0 la pr\u00e9dominance des g\u00e9ants technologiques am\u00e9ricains,\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/11\/Souverainete-des-systemes-d_information-de-l_Etat.png?fit=1200%2C860&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":658,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/08\/etude-dimpacts-sur-la-vie-privee-nouvelle-methode-de-la-cnil\/","url_meta":{"origin":2989,"position":4},"title":"Etude d&#8217;impacts sur la vie priv\u00e9e : nouvelle m\u00e9thode de la CNIL","author":"Fred","date":"8 juillet 2015","format":false,"excerpt":"La Commission a publi\u00e9 il y a peu sa m\u00e9thode pour mener des PIA (Privacy Impact Assessment) pour aider les responsables de traitements dans leur d\u00e9marche de mise en conformit\u00e9 et les fournisseurs dans la prise en compte de la vie priv\u00e9e d\u00e8s la conception de leurs produits. La Loi\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/6640564215_b3dc3f033d.jpg?fit=450%2C287&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":38,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/06\/09\/netflix-means-nobody-is-safe-in-tv-land\/","url_meta":{"origin":2989,"position":5},"title":"Netflix means \u201cnobody is safe\u201d in TV land","author":"Fred","date":"9 juin 2015","format":false,"excerpt":"A major report from investment bankers Exane\/BNP-Paribas states bluntly that Netflix is not just a major disrupter of all that is \u2018normal\u2019 in broadcasting, but its unique global approach to content and product, plus lower costs than its incumbents, means that Netflix is capable of \u201cshifting the ground beneath [the\u2026","rel":"","context":"Dans &quot;Audiovisuel&quot;","block_context":{"text":"Audiovisuel","link":"https:\/\/mouillere.com\/universconvergents\/category\/ip\/audiovisuel\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/2000px-Netflix_logo-1.svg_.png?fit=1200%2C559&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/2000px-Netflix_logo-1.svg_.png?fit=1200%2C559&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/2000px-Netflix_logo-1.svg_.png?fit=1200%2C559&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/2000px-Netflix_logo-1.svg_.png?fit=1200%2C559&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/2000px-Netflix_logo-1.svg_.png?fit=1200%2C559&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/2989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=2989"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/2989\/revisions"}],"predecessor-version":[{"id":2992,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/2989\/revisions\/2992"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/2991"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=2989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=2989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=2989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}