All hail the story wall!
On agile project teams the use of a story wall is ubiquitous. It’s an asset that shows all of the stories (requirements, pieces of work) in play, and their status. It’s a physical wall (often with a virtual counterpart) designed to be an information radiator.
Nobody owns the wall, everybody can contribute to it. That’s the theory, at least.
On many projects the PM and BA are the main consumers of the wall. Their day to day life revolves around it. This leads to the impression that they, in fact, own the wall and an odd culture of taking permission to make changes emerges. I don’t really like it.
This post is a bit of a brain-dump. Bear with me.
Assisted Digital is an interesting ‘phenomenon’ for me, coming to government work from years working in the financial services industry, and specifically retail banking.
What’s Assisted Digital?
‘Assisted Digital’ is, at a high level, enabling people to use digital services where they would otherwise be unable to do so. A good example is my grandad, who would struggle to complete digital forms alone. With assistance from me, the government department, or a third party (eg. Citizens Advice Bureau), he would be successful. This idea forms the basis of the AD strategy, and if you’d like to know more you should click the link at the start of this post.
In retail banking, I can encourage users to use a digital channel very easily and can get a large take-up by doing that. I am also safe in the knowledge that, for the most part, I have a branch network of customer service and sales professionals to fall back on. If my customer doesn’t have a PC/tablet/mobile they can visit the branch and service their accounts or buy products that way. This is an ‘assisted digital’ model where the company has a network that can facilitate that kind of interaction.
WE DONE MORE SCIENCE! This week, it was the battle of the fruit and nut bars. We compared Hotel Chocolat, Cadbury Picnic, and Cadbury Fruit and Nut for the highest chocolate levels.
I’m sure my comrades will agree, this was a difficult one. The final podium was:
For a while I’ve been running a mobile contract with O2 for my mum, who’s now taken a new deal with EE. She asked me to get a PAC and cancel her O2 contract, which is fair enough.
I took to the O2 website, hunted out contact information, and was informed by the site that a live web chat was the best way to deal with my query (go here > It’s about my account > Prefer to speak to someone > Start live chat).
After being passed from one agent to another, I managed to get the PAC from the agent by confirming only the phone number for the account and the name on it. At no point was I asked to confirm details from my password, or any other security details.
The transcript is below, with personal details removed. The question is, how feasible an attack vector is this? If you’re on O2 and I know your name, I could just transfer your number to another SIM easily it seems. You could cause some serious frustration at least, and potentially hijack phone calls if your target doesn’t realise their handset has stopped working (probably less likely, but still).