A to Z Software Development Roles

I’m Chris Saunders, a technologist passionate about product delivery and innovation in the technology industry. This blog is where I share my insights, experiences, and ideas around building and delivering exceptional products.

Software Development Roles: Skill Attributes Visualisation

This 3D scatter plot visualises various software development roles based on three key skill attributes:

  • Project Timeline (x-axis): Representing the spectrum from project start to project end.
  • Focus Orientation (y-axis): Spanning from people focused to technology focused roles.
  • Thinking Style (z-axis): Differentiating between operational thinking and strategic thinking.

Each marker represents a distinct role, with its position indicating the relative emphasis on each of these attributes. Use the chart to explore how different roles balance these skills. How one person in a 3D space could assume another role nearby in the space.

Click the "Reset Chart View" button to reset the chart to its default view.

Click the "Set Y and X Front View" button to set the chart to see Y on the left and X on the bottom.

Click the "Set Y and Z Front View" button to set the chart to see Y on the left and Z on the bottom.

Interacting with the 3D Scatter Plot:

Zoom:

  • Mouse Scroll: Scroll the mouse wheel up and down to zoom in and out.

Rotate:

  • Click and Drag: Click and drag on the plot to rotate it in any direction.
  • Right Click and Drag: Right-click and drag on the plot to pan it left, right, up, or down.

Reset Chart View:

  • Reset Button: Click the "Reset Chart View" button below the plot to reset the view to its default position (Y axis left, X axis bottom, and Z axis depth).

Explore:

  • Hover: Hover over a data point to see additional information about the role it represents.

"H" for Hacker (Ethical). Software Development Roles: A to Z

An ethical hacker's role is to proactively identify and address vulnerabilities in computer systems, networks, and applications. By simulating cyberattacks, they uncover security weaknesses before malicious hackers can exploit them. But here's an interesting thought: when you're hacked, would you even know? Does that last email you read seem a bit off? Or perhaps that video you’re watching feels inconsistent with your usual content?

Personal Story: In the past, I’ve engaged in ethical hacking, but with the rapid advancement of technology—especially with AI—it's become a field where I now prefer to leave the work to specialists. However, my experience as a Privacy Officer has shown me the importance of ethical hacking within the context of New Zealand’s Privacy Act 2020. If a data breach occurs, there are specific steps you must follow according to this Act. Have you ever conducted a Privacy Impact Assessment (PIA) for your project? This is typically done before the project begins, especially if it involves handling personal information. In many cases, it’s a legal requirement. Interesting Fact: Did you know? The term "hacker" originally had a positive meaning, describing individuals with advanced technical skills who enjoyed exploring and experimenting with systems.


Popular Posts