10 Agile Tips From Pokemon Go Coach Training


Millennials know exactly what they want and expectations are high - very high. They are empowered

Pokémon Go players want to improve and become better trainers. The same tips that help you catch more Pokémon can help you become a better scrum master. We caught 10 of those pointers that can be applied to leading an agile team developing enterprise software.

Have you heard of this new game everyone's playing? "Pokémon Go," I think is what they're calling it. I had read about it, but it really came into focus when I saw a group of people with smart phones held at arm's length wandering around the lawn outside a nearby hospital. This is a serious game with serious implications ... for agile development.

As with so many aspects of life, it only took a few days before articles started appearing on the web with advice on how to be a better Pokémon Go trainer. It was only a couple of days later we began to see ads for people willing to catch and train Pokémon for you, but we're not here to talk about PaaS (Pokémon-as-a-Service).

Instead, we're here to talk about how becoming a better Pokémon trainer can help you become a better product owner or scrum master within the agile development discipline.

I know that there are many who will see absolutely no parallels between running around the landscape chasing imaginary monsters with a smartphone and leading an agile team developing enterprise software.

I think those people haven't looked deeply enough at the process of catching and training all those pocket monsters now scattered about the landscape. The link between the two is strong, with deep lessons for scrum masters to be taken from the exercises necessary to "catch them all" in the Pokémon universe.

[See Agile vs. DevOps: 10 Ways They're Different.]

I went around the internet looking for tips on becoming a better Pokémon Go trainer and found a bunch that translate directly into ideas that will help you be a better product owner or scrum master. Out of that group, I've chosen 10 that you should be able to put to use very quickly in order to make a real impact on your next sprint.

Have you become a great Pokémon trainer? Is Pokémon Go taking over your office? I'd really like to hear about your experience with Pokémon Go -- and about all the ways that the game has helped you with your agile experience. The links are out there. Let's hit the parks and catch those Pokémon -- and the lessons they carry!

0 Comment

Leave a Reply

Captcha image


  • 5300c769af79e

    Mirai Botnet Moves to Take Liberia Offline

    The Mirai botnet, which unleashed a massive DDoS attack that crippled US Internet access last month, may have been used in another attempt to take the entire country of Liberia offline this week.ZDNet reports that a Mirai-based botnet, called "Botnet 14," has spent much of the past week intermittently attacking IP addresses of the two telecom operators that co-own the only fiber cable coming into the West African nation of Liberia.
  • 5300c769af79e

    Understanding Evasive Protocols and the Role They Play in Cybersecurity

    Download Threats that hide in high ports and streaming network traffic aren't being detected or stopped by standard cybersecurity solutions.Learn how evasive protocols such as TOR operate, and why most standard solutions are failing to contain them.
  • 5300c769af79e

    Amazon Cracks Down on Review Freebies

    The updated community guidelines provide a limited exception for reviews generated through the Amazon Vine program, which provides strict guidelines that are designed to ensure the integrity of the product review process.The new policy does not apply to books, which may be provided free for review, noted Chew.
  • 5300c769af79e

    Android Security Flaw 'QuadRooter' Hits 900 Million Devices

    A set of four security vulnerabilities could affect nearly one billion Android smartphones and tablets equipped with Qualcomm chipsets, as discovered by Check Point.The recently discovered vulnerabilities has left 900 million Android devices vulnerable to hackers.