We’ve converted the ‘The Sprint Retrospective’ definition from the 2013 Scrum Guide into cartoon form to illustrate how The Sprint Retrospective works in scrum process.

The Sprint Retrospective

The Sprint Retrospective is an opportunity for the Scrum Team to inspect itself and create a plan for improvements to be enacted during the next Sprint.

The Sprint Retrospective occurs after the Sprint Review and prior to the next Sprint Planning.

This is a three-hour time-boxed meeting for one-month Sprints. For shorter Sprints, the event is usually shorter. The Scrum Master ensures that the event takes place and that attendants understand its purpose. The Scrum Master teaches all to keep it within the time -box. The Scrum Master participates as a peer team member in the meeting from the accountability over the Scrum process.

The purpose of the Sprint Retrospective is to:

– Inspect how the last Sprint went with regards to people, relationships, process, and tools;

– Identify and order the major items that went well and potential improvements; and,

– Create a plan for implementing improvements to the way the Scrum Team does its work.

The Scrum Master encourages the Scrum Team to improve, within the Scrum process framework, its development process and practices to make it more effective and enjoyable for the next Sprint. During each Sprint Retrospective, the Scrum Team plans ways to increase product quality by adapting the definition of “Done” as appropriate.

By the end of the Sprint Retrospective, the Scrum Team should have identified improvements that it will implement in the next Sprint. Implementing these improvements in the next Sprint is the adaptation to the inspection of the Scrum Team itself. Although improvements may be implemented at any time, the Sprint Retrospective provides a formal opportunity to focus on inspection and adaptation.

Take the Quiz!

[WATUPRO 16]

About the speakers

Mr Scrum Master

Hello! I'm the Scrum Master, it's nice to be featured here on SSW TV :)

Academy

Related Videos

Federated Identity: OAuth2, Open Id Connect & Duende IdentityServer 5 | Anthony Nguyen

In this talk, Anthony will take an in depth look at Federated Identity using OpenID Connect and OAuth2 Framework for ASP. NET Core using Duende IdentityServer (aka IdentityServer 5). Securing your application is bloody important! With so much jargon to sift through, it’s easy to get lost, for example there’s SSO, OAuth2, SAML 2.0, OpenID…

February Tech News – Supply chain attack! Facebook & Apple privacy showdown and DotNet templates | Adam Cogan

Let’s Talk News with Adam Cogan, talking about some of the latest in the tech industry in February. 00:00​​ – Introduction – welcome to February’s Tech News 00:15​ – Nine signs Google deal 02:08​ – Coding news – supply chain attack!! 05:02​ – Facebook & Apple privacy showdown 06:38​ – Project Bicep – next generation…

January Tech News – Power Apps, new Teams interface, and how Apple Watch is fighting COVID-19 | Adam Cogan

Adam Cogan talks about some exciting new developments with Power Apps, Azure SQL, the new Microsoft Teams interface, Apple Watch helping in the fight against COVID-19, and more! 00:00​ – Introduction – welcome to 2021! 00:24​ – Power Apps turning emails into mobile notifications 01:21​ – Reference: Power Apps new naming: https://youtu.be/SU910ZzDp7M​ 02:03​ – Azure…

Multitenancy with SQL Server | Mehmet Ozdemir

In this Tech Talk, Andreas Lengkeek has a chat with Mehmet Ozdemir. We learn about Multitenancy with SQL Server, and go through some scenarios where this might be useful. In this video SSW Solution Architect Mehmet Ozdemir chats with Andreas Lengkeek about the three options for Multitenancy with SQL Server and how he goes about…

Building Rock SOLID Serverless applications | William Liebenberg

The world has embraced Serverless computing, but some systems still end up with the same problems we thought would be a thing of the past. William covers how we should apply familiar SOLID principles to our Serverless Application architecture and infrastructure. This lets you create systems that are are light, easy to maintain, and benefit…

The Power of VS Code! – NDC Sydney 2020 Ask Me Anything | Aaron Powell

Unleash the power of VS Code! VS Code is hot, there’s no doubt about it being an utterly amazing editor, but are you using it to its full potential? In this session, SSW’s Software Architect Andreas Lengkeek discusses with Aaron Powell his NDC Talk ‘Unleash the Power of VS Code’

Automagic Tenant Config for Mobile Apps | Matt Goldman

How do you get environment- or tenant-specific config into your users’ hands? With mobile or desktop apps, for managed devices we can pre-configure these using SOE or MDM tools. However, deploying configuration to unmanaged devices is the real challenge! In this talk, Matt Goldman looks at some different options for automating this for your users.…

Transform your Power BI Dashboards with Custom Visuals built in React | Prem Radhakrishnan

Quick Question – How many Visualization options come built-in with Power BI? Quick Answer – Not nearly enough. Prem will walk you through the extra visualizations that are in the wonderful awesome Power BI Visuals Marketplace called AppSource. However, no matter how many options you find, there is always a need for that little bit…

Cracking passwords & why L33t!fied passwords are bad | Alexei Doudkine

Watch this demo of how a hacker who has broken into your machine can quickly and easily get your password hashes, take them offline and crack them to retrieve your original password. In this talk, Alexei discusses how passwords are stored in Windows, some techniques real-world hackers use to crack password hashes and what you…

Symmetric encryption, hashing & digital signatures + More – Cryptography 101 | Robert Boedigheimer

Learn the fundamentals of cryptography, including public/private and symmetric encryption, hashing, and digital signatures. Discover which techniques are appropriate for various situations. Review practical real life examples for storing passwords, protecting URL parameters, securely exchanging information with partners, and safely encrypting sensitive information on public web sites. Concepts apply to all platforms, examples will be…