Requirements Analysis that Works!
|
|
|
- Ashlee Allen
- 9 years ago
- Views:
Transcription
1 Requirements that Works! Robert Halligan, FIE Aust Managing Director, Project Performance International int.com Introduction: Innumerable studies have concluded that requirements problems are the single biggest contributor to cost overruns, schedule slippages and loss of capability in systems and software projects. Cost impacts alone of 10%, 20%, 50%, 80% and more are regularly reported by practitioners and researchers. And yet, the cost of making substantial improvements in requirements quality is considerably lower than these cost impacts, typically 0.1 2% of total development cost - if appropriate skills and methods are applied. Requirements analysis (the capture and validation of requirements through analysis of the problem domain) provides the tools for transforming the inadequate to the adequate, requirements- wise. Objectives of Requirements : The usual criterion for adequacy of a set of requirements is that, if the requirements set is satisfied, the level of risk associated with failing to satisfy the needs of relevant stakeholders is low typically an expected loss of value of two or three percent, or less. To this basic criterion can be added the dimension of time. Requirements change with time due to the problem space genuinely changing, and due to what is possible in technology triggering perfectly valid new requirements. So, requirements analysis must be an ongoing activity, to a lesser or greater degree. Types of Requirements Defects: Potential areas of defect in requirements, individually and/or as a set, are: a. correctness - refers to an absence of errors of fact in the specified requirement; b. completeness - for a requirement individually, refers to the inclusion of all necessary information such that if the requirement is satisfied, the need will also be satisfied; Copyright Project Performance International Pty Ltd Page 1 of 8
2 completeness - for requirements as a set, refers to inclusion of sufficient requirements such that if the set is satisfied, the need will also be satisfied with only a small expected loss due to omissions; c. consistency - requires that a requirement not be in conflict with any other requirement, nor be inconsistent internally; d. clarity - requires that a requirement be readily understandable without semantic analysis; e. non- ambiguity - requires that there be only one semantic interpretation of a requirement; f. connectivity - refers to a property whereby all of the terms within a requirement are adequately linked to other requirements and to word and term definitions, causing each individual requirement to properly relate to each other requirement in a set. Connectivity problems typically show up as a result of inconsistent references to the same thing, logical non- sequitur, and incorrect cross- references; g. singularity - refers to a property whereby a requirement cannot sensibly be expressed as two or more requirements having different actors (subjects), actions (verbs) and/or objects of action; h. verifiability - refers to the existence of a finite and objective process with which to provide adequate evidence that a requirement has been satisfied in a solution; i. modifiability - requires that: (i) necessary changes to a requirement can be made completely and consistently; and (ii) the same requirement is specified only once; j. feasibility for a requirement, requires that some means exist whereby the requirement may be satisfied; feasibility for a set of requirements, requires that some means exist whereby the requirements may be satisfied as a set; k. balance for a set of requirements, refers to the set being optimum, i.e., forming a part of an optimum solution to the higher (physical) level problem for which the item which is the subject of the requirements is a part of the solution; l. functional orientation - requires that the set of requirements state what the system is to do, how well it is to do it, necessary external interface characteristics, environmental conditions under which other requirements are to be satisfied, any constraints on the utilization of external resources, any requirements with respect to overall physical Copyright Project Performance International Pty Ltd Page 2 of 8
3 characteristics, and any other required qualities such as those related to reliability, maintainability, transportability, growth capability, safety, etc. Functional orientation requires that design requirements (i.e. solution directed in requirements) be confined to those design directions that can be justified on objective criteria. Possible justifications include greater requirer expertise than that of the developer (e.g., in cryptography), or net benefits from standardization. Requirements analysis aims to reduce the level of risk arising from defects relating to the above characteristics to low. Techniques of Requirements The requirements analysis process used and recommended by the author is illustrated in Figure 1. Identify Stakeholders Read & Assess Plan the SRA * Measure Requirements Quality Requirements Process Context * Design Requirements s & Modes Functional Parsing * ERA Other Constraints Search Stakeholder Value Verification Requirements Development OCD Development or Update Rest of Scenario 0 Out of Range Clean Up *Only performed if existing, specified requirements are input to the analysis P Copyright Project Performance (Australia) Pty Ltd Figure 1: An Effective Requirements Process The set of techniques which combine to comprise a very effective and efficient requirements analysis methodology is described below: a. Stakeholder Identification. The objective of stakeholder identification is to identify stakeholders who are potential owners of requirements, or who can facilitate effective communication relating to requirements. These stakeholders are subsequently encouraged to make input into the definition of the requirements, are consulted regarding requirements issues, and are invited to sign- off on their subsets of requirements. Copyright Project Performance International Pty Ltd Page 3 of 8
4 b. Document Review. Documents, if any, which contain or relate to intended use, requirements, and goals are examined, with a view to identifying key issues that should be resolved with stakeholders before requirements analysis proceeds too far. This review provides input into the planning for conduct of the requirements analysis. c. Context Flow. This analysis tracks the state of the world outside of the system on a whole of life basis, from system cradle to system grave. All requirements of the system originate in these contexts, with one class of exception. Stakeholders are mapped to the contexts, often resulting in the identification of additional stakeholders. The main work product of this analysis is subsequently used to structure analysis work, checks and dialogue with stakeholders. See Figure 2. Figure 2: Context Flow Diagram d. Context. This analysis identifies/validates mainly external interface requirements. The analysis also contributes to environmental requirements. Context analysis helps identify additional stakeholders in the system: owners of interoperating systems; individuals who will interact with the system; and organizational entities with which the system will interface. Context analysis sets the foundation for subsequent capture and validation of required functionality. See Figure 3. Copyright Project Performance International Pty Ltd Page 4 of 8
5 Figure 3: Context Diagram e. s and Modes. This is a high ROI analysis, which establishes the big- picture dynamics required of the system, expressed in terms of states & modes. s and modes analysis often identifies major requirements issues. The analysis also establishes preconditions for subsequent precise and concise specification of the requirements captured in other analyses. See Figure 4. Safe TX Armed Misfire Detonating Legend: TX Time Expired Required transition Permitted but not required transition Prohibited transition Unconnected arrow : Default state or mode Detonated Figure 4: s Transition Diagram Copyright Project Performance International Pty Ltd Page 5 of 8
6 f. Functional. This analysis is conducted within a modeling boundary which encapsulates enough of the problem, including functional aspects of operational scenarios, to capture and validate the required system functional and performance requirements. The result is a set of functional and performance requirements which is sufficiently complete and is at precisely the correct level of abstraction, neither too broad nor at a level of abstraction which directs the implementation of the system, as opposed to capturing the need. Use cases are a basic form of functional analysis; more robust functional modeling techniques can be used for more demanding applications. Figure 5: Functional Flow Block Diagram g. Rest of Scenario. This analysis, conducted iteratively with functional analysis, identifies/validates environmental requirements, physical requirements, resource requirements and contributes additional content to external interface requirements. h. Entity Relationship Attribute. ERA analysis provides input to capture/validation of additional information content of external interface requirements, and some aspects of functional requirements. The analysis is most relevant to data- oriented systems. Copyright Project Performance International Pty Ltd Page 6 of 8
7 Message C CI C CI C CI C CI 1 : 1 1 : 1 - N 1 : : 1 SOM RI MT EOM F F F FB FB FB Figure 6: Entity Relationship Attribute Diagram i. Parsing. Parsing analysis is a text analysis technique for identification of errors, incompleteness, inconsistency, lack of clarity, ambiguity, lack of verifiability, and infeasibility, in textually stated Illustration of Elements of the Parsing Template requirements. The basis of the technique is illustrated below: Actor: The system, Condition: upon receipt of a message, Action: shall switch Object of Action: that message Contraints of Action: within 10 milliseconds of receipt, Refinement of Object: for messages in ACP128 format having a valid routing indicator, Source of Object from the message input port, Destination of Action: to a message output port, (Further) Refinement of Action: corresponding to the routing indicator in the message. P007-AGB Copyright Project Performance (Australia) Pty Ltd Figure 7: Parsing Template The parsing template also provides an excellent aid to writing good requirements the first time, and for rewriting defective requirements. Copyright Project Performance International Pty Ltd Page 7 of 8
8 j. Out-of-Range analysis. This analysis captures and validates any requirements that relate to defective inputs or outputs or abnormal conditions of use/support/disposal. The requirements from this analysis can make the difference between a system that will be effective in the real world, and a system that could be effective only in the ideal world. k. Other Constraints Search. This activity looks for requirements which are ordained from on high (such as from statute law, applicable regulations, policy, governing standards, directives). l. Clean-Up. This activity verifies the refined requirements set, looking for residual defects in the work products of the analysis. Keyword searching is used in combination with specific verification criteria. Conclusion: SRS (if any) SRS-refined Ref. AND AND Ref. 3 5 AND 4 AND Other Info 3 LP OR OR LP 5 VRS Analytical work products OCD VM SRS: VRS: OCD: VM: system or software requirements specification verification requirements specification operational concept description value (or system/software effectiveness) model Document Number: PPI Copyright Project Performance Australia 2012 Figure 8: Approach to Requirements Methods exist to perform requirements capture and validation both efficiently and very effectively. The methods rely, not on requirements elicitation per se (which is neither efficient nor effective), but on elicitation of responses from stakeholders to specific requirements issues identified mainly through effective analysis of the problem domain. Copyright Project Performance International Pty Ltd Page 8 of 8
3SL. Requirements Definition and Management Using Cradle
3SL Requirements Definition and Management Using Cradle November 2014 1 1 Introduction This white paper describes Requirements Definition and Management activities for system/product development and modification
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5. No. 8, November-December 2006 Requirements Engineering Tasks Donald Firesmith,
Introducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
Sofware Requirements Engineeing
Sofware Requirements Engineeing Three main tasks in RE: 1 Elicit find out what the customers really want. Identify stakeholders, their goals and viewpoints. 2 Document write it down (). Understandable
Requirements engineering
Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and
Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org
SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History
The Gateway Review Process
The Gateway Review Process The Gateway Review Process examines programs and projects at key decision points. It aims to provide timely advice to the Senior Responsible Owner (SRO) as the person responsible
DEVELOPING REQUIREMENTS FOR DATA WAREHOUSE SYSTEMS WITH USE CASES
DEVELOPING REQUIREMENTS FOR DATA WAREHOUSE SYSTEMS WITH USE CASES Robert M. Bruckner Vienna University of Technology [email protected] Beate List Vienna University of Technology [email protected]
VAIL-Plant Asset Integrity Management System. Software Development Process
VAIL-Plant Asset Integrity Management System Software Development Process Document Number: VAIL/SDP/2008/008 Engineering For a Safer World P u b l i c Approved by : Ijaz Ul Karim Rao Revision: 0 Page:2-of-15
System Development Life Cycle Guide
TEXAS DEPARTMENT OF INFORMATION RESOURCES System Development Life Cycle Guide Version 1.1 30 MAY 2008 Version History This and other Framework Extension tools are available on Framework Web site. Release
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)
PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value
ORACLE ENTERPRISE DATA QUALITY PRODUCT FAMILY
ORACLE ENTERPRISE DATA QUALITY PRODUCT FAMILY The Oracle Enterprise Data Quality family of products helps organizations achieve maximum value from their business critical applications by delivering fit
Requirements Traceability. Mirka Palo
Requirements Traceability Mirka Palo Seminar Report Department of Computer Science University of Helsinki 30 th October 2003 Table of Contents 1 INTRODUCTION... 1 2 DEFINITION... 1 3 REASONS FOR REQUIREMENTS
Software development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali
Software development life cycle Software life cycle: Software Engineering - II ITNP92 - Object Oriented Software Design Dr Andrea Bracciali Module Co-ordinator 4B86 [email protected] Spring 2014 (elicitation)
Announcements. SE 1: Software Requirements Specification and Analysis. Review: Use Case Descriptions
Announcements SE 1: Software Requirements Specification and Analysis Lecture 4: Basic Notations Nancy Day, Davor Svetinović http://www.student.cs.uwaterloo.ca/ cs445/winter2006 uw.cs.cs445 Send your group
ECDL / ICDL Project Planning Project Management Software Level 2. Syllabus Version 1.0 (UK)
ECDL / ICDL Project Planning Project Management Software Level 2 Syllabus Version 1.0 (UK) Purpose This document details the syllabus for ECDL / ICDL Project Planning. The syllabus describes, through learning
6-1. Process Modeling
6-1 Process Modeling Key Definitions Process model A formal way of representing how a business system operates Illustrates the activities that are performed and how data moves among them Data flow diagramming
Section C. Requirements Elicitation
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License. Your use of this material constitutes acceptance of that license and the conditions of use of materials on this
Ten steps to better requirements management.
White paper June 2009 Ten steps to better requirements management. Dominic Tavassoli, IBM Actionable enterprise architecture management Page 2 Contents 2 Introduction 2 Defining a good requirement 3 Ten
Effective Business Requirements (Virtual Classroom Edition)
Developing & Confirming Effective Business Requirements (Virtual Classroom Edition) Eliminate Costly Changes and Save Time by Nailing Down the Project Requirements the First Time! Pre-Workshop Preparation
Software Development Processes. Software Life-Cycle Models. Process Models in Other Fields. CIS 422/522 Spring 1998 1
1 Software Development Processes Sequential, Prototype-based RAD, Phased, Risk-based Spiral (c) 1998 M Young CIS 422/522 1/10/99 1 Software Life-Cycle Models Breaking projects down into pieces for... Planning
Simulink Modeling Guidelines for High-Integrity Systems
Simulink Modeling Guidelines for High-Integrity Systems R2015a How to Contact MathWorks Latest news: www.mathworks.com Sales and services: www.mathworks.com/sales_and_services User community: www.mathworks.com/matlabcentral
Story Card Based Agile Software Development
Story Card Based Agile Software Development Chetankumar Patel, and Muthu Ramachandran Leeds Metropolitan University, UK [email protected] Abstract The use of story cards for user stories in many Extreme
SOFTWARE REQUIREMENTS
SOFTWARE REQUIREMENTS http://www.tutorialspoint.com/software_engineering/software_requirements.htm Copyright tutorialspoint.com The software requirements are description of features and functionalities
Draft Requirements Management Plan
BAO111: Core Competencies for the Business Analyst Draft Requirements Management Plan 1.0 INTRODUCTION 1.1 Purpose This document outlines requirements roles and responsibilities, presents a stakeholder
Overview of: A Guide to the Project Management Body of Knowledge (PMBOK Guide) Fourth Edition
Overview of A Guide to the Project Management Body of Knowledge (PMBOK Guide) Fourth Edition Overview of: A Guide to the Project Management Body of Knowledge (PMBOK Guide) Fourth Edition 1 Topics for Discussion
Digital Advisory Services Professional Service Description Network Assessment
Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,
What is a requirement? Software Requirements. Descriptions and specifications of a system
What is a requirement? Software Requirements Descriptions and specifications of a system May range from a high-level abstract statement of a service or a statement of a system constraint to a detailed
And the Models Are 16-03-2015. System/Software Development Life Cycle. Why Life Cycle Approach for Software?
System/Software Development Life Cycle Anurag Srivastava Associate Professor ABV-IIITM, Gwalior Why Life Cycle Approach for Software? Life cycle is a sequence of events or patterns that are displayed in
Menouer Boubekeur, Gregory Provan
Software Requirements Menouer Boubekeur, Gregory Provan Lectures Introduction to UML Introduction to Requirements Analysis Advanced techniques for Requirement Analysis M. Boubekeur, CSL, University College
Evaluation of a Use-Case-Driven Requirements Analysis Tool Employing Web UI Prototype Generation
Evaluation of a Use-Case-Driven Requirements Analysis Tool Employing Web UI Prototype Generation SHINPEI OGATA Course of Functional Control Systems, Graduate School of Engineering Shibaura Institute of
CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems
Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field
ECDL / ICDL Project Planning Syllabus Version 1.0
ECDL / ICDL Project Planning Syllabus Version 1.0 Purpose This document details the syllabus for ECDL / ICDL Project Planning. The syllabus describes, through learning outcomes, the knowledge and skills
Business Definitions for Data Management Professionals
Realising the value of your information TM Powered by Intraversed Business Definitions for Data Management Professionals Intralign User Guide Excerpt Copyright Intraversed Pty Ltd, 2010, 2014 W-DE-2015-0004
Vito Madaio, PMP, TSPM 2015, September, 24th
PMI-PBA Certification Vito Madaio, PMP, TSPM 2015, September, 24th Topics What is Business Analysis Business Analysis Certification PMI-PBA Prep Course Q&A Orientamento alla Business Analysis PBA-Prep
The SPES Methodology Modeling- and Analysis Techniques
The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München [email protected] Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT
META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING
META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING Ramesh Babu Palepu 1, Dr K V Sambasiva Rao 2 Dept of IT, Amrita Sai Institute of Science & Technology 1 MVR College of Engineering 2 [email protected]
Software Test Plan (STP) Template
(STP) Template Items that are intended to stay in as part of your document are in bold; explanatory comments are in italic text. Plain text is used where you might insert wording about your project. This
Software Requirements. Objectives
Software Requirements cmsc435-1 Objectives To introduce the concepts of user and system requirements To describe functional and non-functional requirements To explain how software requirements may be organized
Engineering a EIA - 632
es for Engineering a System EIA - 632 SE Tutorial es for Engr Sys - 1 Fundamental es for Engineering a System Acquisition and Supply Supply Acquisition es for Engineering A System Technical Management
Business Analysis Standardization & Maturity
Business Analysis Standardization & Maturity Contact Us: 210.399.4240 [email protected] Copyright 2014 Enfocus Solutions Inc. Enfocus Requirements Suite is a trademark of Enfocus Solutions Inc.
Project Management for Implementing the Smart Grid By Power System Engineering, Inc. Abstract PM Methodology Using a Repeatable Project Management
Project Management for Implementing the Smart Grid By Power System Engineering, Inc. Abstract PM Methodology Using a Repeatable Project Management Approach Project management solutions for the Smart Grid
A Survey on Requirement Analysis in the Nigerian Context
A Survey on Requirement Analysis in the Nigerian Context Olaronke Ganiat Elias 1, Janet Olusola Olaleke 1, Micheal Segun Olajide 1, and Nureni John Ayinla 1 1 Computer Science Department, Adeyemi College
How the Ministry of Education managed the 2008 national school bus transport tender process. Report to the Ministry of Education October 2009
How the Ministry of Education managed the 2008 national school bus transport tender process Report to the Ministry of Education October 2009 Contents 1: Introduction... 3 What is school transport?... 3
Use Case Diagrams. Tutorial
Use Case Diagrams Tutorial What is a use case? A requirements analysis concept A case of a use of the system/product Describes the system's actions from a the point of view of a user Tells a story A sequence
NEMDE INTERCONNECTOR NON-PHYSICAL LOSS MODEL CHANGES - BUSINESS SPECIFICATION
NEMDE INTERCONNECTOR NON-PHYSICAL LOSS MODEL CHANGES - BUSINESS SPECIFICATION PREPARED BY: DOCUMENT NO: 173-0190 VERSION NO: 1.03 EFFECTIVE DATE: 01/07/2010 ENTER STATUS: Market Operations Performance
System Modeling / Class Diagra Diagr m a Week 6
System Modeling / Class Diagram Week 6 System modeling Agenda (Lecture) Agenda (Lab) Create CRC cards for your group project Create a system level (analysis level) class diagram (Lab Assignment #6) for
ISO 9001 : 2008 QUALITY MANAGEMENT SYSTEM AUDIT CHECK LIST INTRODUCTION
INTRODUCTION What auditors should look for: the items listed in these headings that the ISO requirement is met that the requirement is met in the manner described in the organization's documentation Page
UNSOLICITED PROPOSALS
UNSOLICITED PROPOSALS GUIDE FOR SUBMISSION AND ASSESSMENT January 2012 CONTENTS 1 PREMIER S STATEMENT 3 2 INTRODUCTION 3 3 GUIDING PRINCIPLES 5 3.1 OPTIMISE OUTCOMES 5 3.2 ASSESSMENT CRITERIA 5 3.3 PROBITY
Metrics for Requirements Engineering
Metrics for Requirements Engineering Mohammed Javeed Ali June 15, 2006 Master s Thesis, 10 credits Supervisor Jurgen Borstler Umeå University Department of Computing Science SE-901 87 UMEÅ SWEDEN Abstract
Course Outline. Foundation of Business Analysis Course BA30: 4 days Instructor Led
Foundation of Business Analysis Course BA30: 4 days Instructor Led Prerequisites: No prerequisites - This course is suitable for both beginner and intermediate Business Analysts who would like to increase
Requirements Engineering Process
Software Engineering Requirements Engineering Process Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To describe the principal requirements engineering activities and d their
Procedure for Assessment of System and Software
Doc. No: STQC IT/ Assessment/ 01, Version 1.0 Procedure for Assessment of System and Software May, 2014 STQC - IT Services STQC Directorate, Department of Electronics and Information Technology, Ministry
How To Model Software Development Life Cycle Models
Various Software Development Life Cycle Models Sahil Jindal, Puneet Gulati, Praveen Rohilla Dronacharya College of Engineering, India Abstract:An SDLC model is a conceptual framework describing different
Software Engineering/Courses Description Introduction to Software Engineering Credit Hours: 3 Prerequisite: 0306211(Computer Programming 2).
0305203 0305280 0305301 0305302 Software Engineering/Courses Description Introduction to Software Engineering Prerequisite: 0306211(Computer Programming 2). This course introduces students to the problems
H3C SSL VPN RADIUS Authentication Configuration Example
H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by
Process Modeling. Chapter 6. (with additions by Yale Braunstein) Slide 1
Process Modeling Chapter 6 (with additions by Yale Braunstein) Slide 1 PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 John Wiley & Sons, Inc. All rights reserved.
IPL Service Definition - Data Quality
IPL Proposal V1 April 2014 Project: Date: 10 April 2014 Issue Number: V1 Customer: Crown Commercial Service Page 1 of 11 IPL Information Processing Limited 2014 Contents 1. Service - Data Quality 3 1.1.
Data Governance. David Loshin Knowledge Integrity, inc. www.knowledge-integrity.com (301) 754-6350
Data Governance David Loshin Knowledge Integrity, inc. www.knowledge-integrity.com (301) 754-6350 Risk and Governance Objectives of Governance: Identify explicit and hidden risks associated with data expectations
Systems Engineering. August 1997
Systems Engineering A Way of Thinking August 1997 A Way of Doing Business Enabling Organized Transition from Need to Product 1997 INCOSE and AIAA. This work is a collaborative work of the members of the
Case Study: Vitamix. Improving strategic business integration using IT service management practices and technology
Improving strategic business integration using IT service management practices and technology Publication Date: 17 Sep 2014 Product code: IT0022-000180 Adam Holtby Summary Catalyst For Vitamix, a key driver
Auditing UML Models. This booklet explains the Auditing feature of Enterprise Architect. Copyright 1998-2010 Sparx Systems Pty Ltd
Auditing UML Models Enterprise Architect is an intuitive, flexible and powerful UML analysis and design tool for building robust and maintainable software. This booklet explains the Auditing feature of
White Paper What Solutions Architects Should Know About The TOGAF ADM
White Paper What Solutions Architects Should Know About The TOGAF ADM WP0015 October 2011 The Open Group Architecture Framework 1 (TOGAF) is the most widely referenced architecture framework currently
USING THE EVALUABILITY ASSESSMENT TOOL
USING THE EVALUABILITY ASSESSMENT TOOL INTRODUCTION The ILO is committed to strengthening the Office-wide application of results-based management (RBM) in order to more clearly demonstrate its results
2.1. Introduction to UML: Use-Case Diagram
Training Workshop on Business Process Analysis in International Trade Module 2: Analysis and description of existing business processes related to foreign trade activities 2.1. Introduction to UML: Use-Case
SCADE SUITE SOFTWARE VERIFICATION PLAN FOR DO-178B LEVEL A & B
SCADE SUITE SOFTWARE VERIFICATION PLAN FOR DO-78B LEVEL A & B TABLE OF CONTENTS. INTRODUCTION..... PURPOSE..... RELATED DOCUMENTS..... GLOSSARY... 9.. CONVENTIONS..... RELATION WITH OTHER PLANS....6. MODIFICATION
Object-Oriented Design Guidelines
Adaptive Software Engineering G22.3033-007 Session 8 Sub-Topic 3 Presentation Object-Oriented Design Guidelines Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute
Use Cases. Massimo Felici. Massimo Felici Use Cases c 2004 2011
Use Cases Massimo Felici Use Cases 1 Support requirements engineering activities and the requirement process Capture what a system is supposed to do, i.e., systems functional requirements Describe sequences
Becoming a Business Analyst
Becoming a Business Analyst What is Business Analysis? The practice of enabling change in an organizational context by defining needs and recommending solutions that delivers value to stakeholders When
Requirements Engineering: A Roadmap
Requirements Engineering: A Roadmap Bashar Nuseibeh & Steve Easterbrook Department of Computing Imperial College of Science, Technology & Medicine London SW7 2BZ, UK Email: [email protected] http://www-dse.doc.ic.ac.uk/~ban/
Software Engineering. System Modeling
Software Engineering System Modeling 1 System modeling System modeling is the process of developing abstract models of a system, with each model presenting a different view or perspective of that system.
IPS Attack Protection Configuration Example
IPS Attack Protection Configuration Example Keywords: IPS Abstract: This document presents a configuration example for the attack protection feature of the IPS devices. Acronyms: Acronym Full spelling
Exhibit F. VA-130620-CAI - Staff Aug Job Titles and Descriptions Effective 2015
Applications... 3 1. Programmer Analyst... 3 2. Programmer... 5 3. Software Test Analyst... 6 4. Technical Writer... 9 5. Business Analyst... 10 6. System Analyst... 12 7. Software Solutions Architect...
Software Quality Assurance Plan
For Database Applications Document ID: Version: 2.1a Planning Installation & Acceptance Integration & Test Requirements Definition Design Development 1 / 54 Copyright 2000-2006 Digital Publications LLC.
Instructional Designer Standards: Competencies & Performance Statements
Standards Set 2012 ibstpi Instructional Designer Standards: Competencies & Performance Statements The 2012 ibstpi Instructional Designer Competencies and Performance statements are copyrighted by the International
Lecture 9: Requirements Modelling
A little refresher: What are we modelling? Lecture 9: Requirements Modelling Requirements; Systems; Systems Thinking Role of Modelling in RE Why modelling is important Limitations of modelling Brief overview
Standard 1. Governance for Safety and Quality in Health Service Organisations. Safety and Quality Improvement Guide
Standard 1 Governance for Safety and Quality in Health Service Organisations Safety and Quality Improvement Guide 1 1 1October 1 2012 ISBN: Print: 978-1-921983-27-6 Electronic: 978-1-921983-28-3 Suggested
7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers
Contents Page 1 Introduction 2 2 Objectives of the Strategy 2 3 Data Quality Standards 3 4 The National Indicator Set 3 5 Structure of this Strategy 3 5.1 Awareness 4 5.2 Definitions 4 5.3 Recording 4
PROJECT MANAGEMENT FRAMEWORK
PROJECT MANAGEMENT FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Executive Assistant to
Software Engineering Question Bank
Software Engineering Question Bank 1) What is Software Development Life Cycle? (SDLC) System Development Life Cycle (SDLC) is the overall process of developing information systems through a multi-step
A Quality Requirements Safety Model for Embedded and Real Time Software Product Quality
A Quality Requirements Safety Model for Embedded and Real Time Product Quality KHALID T. AL-SARAYREH Department of Engineering Hashemite University Zarqa 13115, Jordan [email protected] Abstract safety
Legal Aid Board Training. 2010 Legal Aid Education P, Session 1, Page 1 Session 1. Introduction
to Legal Aid 2010 Legal Aid Education P, Session 1, Page 1 Session 1 Governance as Leadership What is governance? Governance is the exercise of authority, direction and control of an organization in order
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
Entity / Activity Table for Causeway Cash Receipts System
Entity / Activity Table for Causeway Cash System Entity Activity 1 Sends checks and remittance advices (together) 2 Mailroom Clerk Endorses checks 3 Mailroom Clerk Processes remittance - writes amount
Volume 11 Issue 7 Version 1.0 December 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.
Volume 11 Issue 7 Version 1.0 December 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: & Print ISSN: Abstract - The prime objective
Measuring and Monitoring the Quality of Master Data By Thomas Ravn and Martin Høedholt, November 2008
Measuring and Monitoring the Quality of Master Data By Thomas Ravn and Martin Høedholt, November 2008 Introduction We ve all heard about the importance of data quality in our IT-systems and how the data
Requirements engineering and quality attributes
Open Learning Universiteit Unit 2 Learning Unit 2 Requirements engineering and quality attributes Contents Introduction............................................... 21 2.1 Important concepts........................................
Quick Guide Business Process Modeling Notation (BPMN)
Quick Guide Business Process Modeling Notation (BPMN) IDM Technical Team January 2007 Quick Guide: BPMN 2 of 14 The scope of this document is to provide a quick guide to the concepts and usage of the Business
Examination SUBJECT. Version:
SUBJET Version: 1 Which of the following statements best describes Business nalysis? Business nalysis provides the reasoning for initiating a project. Business nalysis is the strategic part of the project
Abu Dhabi EHSMS Regulatory Framework (AD EHSMS RF)
Abu Dhabi EHSMS Regulatory Framework (AD EHSMS RF) Technical Guideline Audit and Inspection Version 2.0 February 2012 Table of Contents 1. Introduction... 3 2. Definitions... 3 3. Internal Audit... 3 3.1
