Errata for Risk-First Software Development, Second Edition B2.0

Thanks for letting me review this book. I’ve noticed the following errata while reading the book (PDF version B2.0):

  • Page 35

    • 2nd bullet point of section Risk Registers:

      • categories → category

      • focus → focus of

    • 2nd paragraph in section 1. Sharing the Risk Register: its very important → it’s very important

  • Page 54, last paragraph: as shown in below → as shown below or as shown in the figure below or as shown in Figure 4.3 below

  • Page 60, 1st paragraph: rather than in let it surface → rather than let it surface

  • Page 62, missing beginning of sentence: […] the same actions Waterfall prescribes

  • Page 65, paragraph starting with The Gamma et al.: try and and explain → try and explain

  • Page 66, 1st bullet point: and the the risks of → and the risks of

  • Page 98, quotation in section Risk Answer: risk appetite and risk appetite. → risk appetite.

  • Page 109, 1st bullet point in section Example: The Financial Crisis: fix wording: the risk that the amount some asset is going to change in value

  • Page 110, last paragraph: financial services still uses the categories → financial services still use the categories

  • Page 116, threat Over-Complication: as much as many → as many

  • Page 129

    • 2nd threat of Maintainability and Serviceability: except without → except by

    • threat Robustness: of how well → how well

  • Page 130, threat Safety: resulting in you under-billing → resulting in your under-billing

  • Page 138, 2nd bullet point: missing second part of sentence: “The bus to work leaves at 7:30am” or […]

  • Page 141, threat Upstream Dependencies: remove or put in parentheses: The less reliable Reliability Risk your dependencies are…

  • Page 142, 1st paragraph: won’t be get → won’t be getting or wont’ get

  • Page 144, 1st paragraph: reduced costs → reduce costs

  • Page 145

    • bullet point Reliability Risk: remove superfluous full stop at the end of the line

    • 1st sentence after bullet points: degree overlap → degree of overlap

  • Page 150

    • section The Principle-Agent dilemmaThe Principal-Agent dilemma

    • section Worked Example: A the core → At the core

  • Page 165, section Practices Addressing Communication Risk: while stakeholder management or ensures → while stakeholder management ensures

  • Page 177

    • 1st paragraph:

      • This is where subset → This is where a subset or This is where subsets

      • We’ll address → We’ll address this

    • section 5. Deadlock:

      • gridlock- → gridlock

      • other traffic is occupying the space it wants to move to already → other traffic is already occupying the space it wants to move to

  • Page 189, 2nd bullet point of threat Hardware Supply Chain Threats: in a network routers → in network routers

  • Page 193, section Anecdote Corner: the its use of the Java APIs → its use of the Java APIs or the use of the Java APIs

  • Page 200, section Anecdote Corner: risk management failures**,** → risk management failures**.**

  • Page 208, Faceook → Facebook

  • Page 216, 1st paragraph of section The Longer Term: Future Risks For AI Integrators: close parentheses after and so on.

  • Page 229, 2nd paragraph: take other side → take the other side

  • Page 230, This is the just the first example → This is just the first example

  • Page 240, 4th paragraph: tends to be the even more ephemeral → tends to be even more ephemeral

  • Page 244, 1st paragraph: to be able to effective triage risk → to be able to effectively triage risk

In addition, generally in the ePub version, the figure captions contain two labels: one with a continuous index and one with a per-chapter index, e.g. Figure 28. Figure 5.2.

Kind regards,
Andreas