All latest technology news from developers, designers and startups.

showing working space with laptops, coffees, mobile phones and people working

Agile workflow process ABC

What is Agile workflow? 

“Agile is a corporate capability to be able to achieve the Agile benefits.” – Arie van Bennekum

Agile is an iterative methodology for delivering a project. It is often perceived as a philosophy and a way of thinking over a framework or process. That is important to remember because oftentimes Agile gets confused with Scrum. While a team can be Agile without practicing Scrum, it cannot practice Scrum and not be Agile.

Let’s look at the Agile manifesto, its values, and its principles to understand more. They were created by a group of programmers, who were looking for an alternative to software being developed. 

“We are uncovering better ways of developing software by doing it and helping others do it. Through this work we have come to value:

Individuals and interactions over processes and tools

Working software over comprehensive documentation

Customer collaboration over contract negotiation

Responding to change over following a plan

That is, while there is value in the items on the right, we value the items on the left more.’’

The 12 principles articulated in the Agile Manifesto are:

  1. Satisfying customers through early and continuous delivery of valuable work.
  2. Breaking big work down into smaller tasks that can be completed quickly.
  3. Recognizing that the best work emerges from self-organized teams.
  4. Providing motivated individuals with the environment and support they need and trusting them to get the job done.
  5. Creating processes that promote sustainable efforts.
  6. Maintaining a constant pace for completed work.
  7. Welcoming changing requirements, even late in a project.
  8. Assembling the project team and business owners on a daily basis throughout the project.
  9. Having the team reflect at regular intervals on how to become more effective, then tuning and adjusting behavior accordingly.
  10. Measuring progress by the amount of completed work.
  11. Continually seeking excellence.
  12. Harnessing change for a competitive advantage.

Ecartic and workflows

At Ecartic there are a variety of projects going on and we use different workflows for appropriate projects. Our current projects vary from implementing product improvement, as well as building entirely new products from scratch. Some are B2C and some are B2B, some are very backend heavy, whereas some are more focused on the front end and user flows. We are always exploring which workflow fits best for the purpose. 

Also, the development team sizes vary from very small to larger teams, and taking that and the team’s preferences into consideration is probably the key success factor.

Different types of Agile workflows, as brought out by educba:

  1. Feature Driven Development (FDD)

As the name indicates, FDD is an iterative and progressive workflow model for system development, primarily focusing on features. The concept of FDD is to come up with high-end features and scope, so as to develop the entire model and execute the same. The FDD goes through the five stages:

  • Develop the Entire Model: Firstly, a few models are selected specifically for each domain. And these domain models are successively blended into one entire model based on the concept and scope.
  • Develop the Listed features: Features are the list of requirements specific to the customers. These features are to be completed within a timeframe of not more than 2 weeks for release.
  • Feature Planning: The listed features are then assigned to the developers.
  • Feature Designing: The details of every feature are developed, evaluated and then finalized.
  • Feature Building: After the design is inspected and improved, the entire feature is included in the main build to be delivered to the customers.
  1. Crystal

Crystal is not a set of pre-defined tools or patterns but is a set of various software methodologies. The crystal model is human-centric and considers people as the most important asset in system development, followed by the processes to meet the client requirements. The crystal process does not pre-define the tools or methods at the very start of the project but is determined based on the business and technical requisites of a project. Based on the time duration and project conditions, crystal is further subdivided and denoted by various colors.

  1. Agile Unified Process (AUP)

The unified process is an iterative and progressive method consisting of four steps. These are, ‘Inception’, ‘Elaboration’, ‘Construction’, and ‘Transition’.

  1. Extreme Programming (XP)

XP is one of the popular agile workflow models, which is focused on continual improvement through customer feedback. The workflow of XP for system development is comprised of 4 stages. These are, ‘Coding’, ‘Testing’, ‘Listening’, and ‘Designing’.

  1. Scrum

Scrum is an agile workflow process based on a repetitive approach. Scrum emphasizes continual improvement for customer satisfaction. The workflow of Scrum consists of ‘Product Backlog’, ‘Planning Sprint’, ‘Sprint Backlog’, ‘Sprint’, ‘Routine Scrum Meetings’, ‘Sprint Reviewal’, and ‘Internal Scrum Meetings’.

  1. Kanban

Kanban is based on the lean development process, which is a popular methodology introduced by Toyota Motors. It is an agile method that is non-iterative and is less structured. It emphasizes on delivering quality on a continual basis by effective team collaboration. The Kanban workflow comprises of ‘Product Backlog’, ‘Requirements’, ‘Design’, ‘Development’, ‘Testing’, ‘Deployment’, and ‘Done’ stages.

  1. Altern

One of the agile methods which have been prevailing for the longest time is also used in Non-IT sectors. In this method, the project benefits and requirements are pre-defined clearly before the actual execution. This workflow includes stages of, ‘Pre-project’, ‘Feasibility’, ‘Foundations’, ‘Exploration’, ‘Engineering’, ‘Deployment’, and ‘Post Project’.

How to know what workflow is right for you?

There probably is no right answer to that question. It literally depends on your product, customers, team preferences, etc. Some projects require features to be released in batches and will most likely have to be scheduled, supported with release notes, or even require customers to update software whereas incremental improvement on a website’s navigation is more likely to be done per feature and also A/B tested. Winnings organizations are the ones who choose the right workflow for a specific project and also can pivot to another workflow when relevant.

What are the lessons we have learned on the way?

As stated at the beginning, people and teams are the most important factor, and no workflow is a solution that fits all projects. It can even be refreshing to change workflow and try out new things just to break the routine. Happy teams make the best product!!

Ecartic wordmark logo

Team Ecartic


2120 1376 Ecartic
Hope is not a strategy against data breaches. Data breach Strategy.

How To Prevent A Data Breach In Your Company?

Firstly, what is a data breach? A data breach is when your information, specifically online data, is accidentally or intentionally leaked. This might occur because of a mistake on a company’s or employee’s part, or it might happen as a result of a cyber-attack. The data in question, for example, names, emails, financial details, passwords, and usernames, is extremely valuable to cybercriminals. Security breaches at companies could result in stolen money, loss of reputation due to data leakage, or production stops. People’s data could be used to make purchases or, in worst-case scenarios, to steal their identity. This is why hope is not a strategy against data breaches and whatever the size of the company you should have a clear strategy to prevent data breaches. 

There are many steps that a company can take to protect themselves and their employees from security risks and data breaches. The following are our top three recommendations for protecting and securing your company:


1. Train your team: employees are experts, just not always in cybersecurity.


90% of data breaches and leaks are due to human error.

Let’s elaborate on why: the Psychology of human error 2022 report states that, when it comes to cybersecurity, one-third of respondents (33%) said they rarely or never thought about it at work. But here’s the thing: not every employee is a cybersecurity expert. When faced with to-do lists, diversions, and the need to get things done fast, cognitive burdens become overpowering, and mistakes can occur.

That is why it’s important to educate your employees; make sure that they have the right knowledge, are using the right practices, and are following the protocols you have set up in the company.
For our Ecartic team, we used a company called Etevä. They have provided seminars and training courses for our team.


2. Restrict data access, to prevent data breaches. 


The fewer people have access to certain data, the fewer chances there are of having a data breach. You should make sure that all your data and company information is shared with the right people. Furthermore, access should be given to those who are authorized to have it and need it.

One big reason data protection is also important is the General Data Protection Regulation (GDPR). As an employer, you must be transparent about how you are using and safeguarding your employees’ data, inside and outside the organisation. You must be accountable for your data processing activities and be able to show how you meet data protection principles. 


3. Increase general security by using a VPN.


Another way to protect company data is to use a VPN. Especially now when employees have largely moved to remote work, which has posed new security challenges for big corporations and individuals alike. Often, the most vulnerable entry point is mobile devices. VPNs can be used to protect connections made by computers, laptops, and smartphones. They can also protect you from hacking attacks like DDoS, malware, cookie theft, and many more. At the end of the day, your employees can be trained and knowledgeable, but having extra protection is simply a must. That is why at Ecartic, our employees use BlufVPN to improve our security. BlufVPN is one of Ecartics’ ventures and probably one of the reasons we have learned as Ecartic the importance of security and privacy. If the topics of internet security and privacy interest you, then make sure to check out BlufVPN’s blog.

Our COO, Sami Koponen who is also the Managing Director of BlufVPN, shared his thoughts:


”Working from home has become a new reality for many of us. This creates new kinds of challenges for both individuals and companies especially when it comes to online privacy. Working from a personal computer and accessing companies’ sensitive data is a daydream to man-in-the-middle attacks and phishing attempts. That is where Bluf comes in, BlufVPN offers VPN services for customers as well as dedicated enterprise solutions.


Make sure to get in touch, to find a solution for your company! And if you wish to try out Bluf in the meantime, use code bluf30 for a 30-day free trial! 

Data breaches will become more risky and impactful


Data breaches are likely here to stay, and they might even become more and more frequent as we move more and more of our work and daily lives into digital spaces. This means that data breaches will also become more risky and impactful. It’s so crucial that companies have the right approach and teach their teams the right tools. That is the best way to avoid most data breaches!
data breach

Sami Koponen

COO @Ecartic and MD @BlufVPN

Eloora Rannala

Work Culture Manager

1600 900 Ecartic
Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Here you can change your Privacy preferences. It is worth noting that blocking some types of cookies may impact your experience on our website and the services we are able to offer.

For performance and security reasons we use Cloudflare
Click to enable/disable Google Analytics tracking code.
Click to enable/disable Google Fonts.
Click to enable/disable Google Maps.
Click to enable/disable video embeds.
Our website uses cookies, mainly from 3rd party services. By continuing visiting you agree to our mild cookie storage.