Saurabh Goel created an analysis questionnaire to help business analysts effectively gather requirements for infrastructure transformation projects. The questionnaire includes questions about current infrastructure setup, users, disaster recovery, availability, licensing, and more. It provides a structured way for analysts to understand the as-is environment and identify necessary changes when designing a new infrastructure strategy. The document also shares sample questions analysts can use to collect additional details from individual users about their specific software, access needs, and job roles to fully understand requirements. The goal is to help analysts gather the right information upfront to develop an optimal new infrastructure design.
Joint Application Design (JAD) was developed by IBM in the late 1970s. It is a requirements determination method that brings together business and IT professionals in a structured workshop to determine and discuss system requirements
Joint Application Design (JAD) was developed by IBM in the late 1970s. It is a requirements determination method that brings together business and IT professionals in a structured workshop to determine and discuss system requirements
Starting the Small Case: Technical ConsiderationsMuruga J
cP-DocRev is a comprehensive web based document management and linear review platform allowing you to you control your data, work with variety of formats, including native files and image sources.
ONetOnline.org - The O*NET program is the nation's primary source of occupational information providing a framework that identifies the most important types of information about work.
Software architecture for developers by Simon BrownCodemotion
The agile and software craftsmanship movements are pushing up the quality of the software systems we build, but there’s more we can do because even a small amount of software architecture can prevent many of the problems that projects still face, particularly if the team seems to be more chaotic than they are self-organising. Successful software projects aren’t just about good code and sometimes you need to step away from the IDE for a few moments to see the bigger picture. This session is about that bigger picture, software architecture, technical leadership and the balance with agility.
For more classes visit
www.snaptutorial.com
Scenario: As an IT administrator for your organization, your supervisor has given you an assignment to review and evaluate ways for improving the network for International Plastics. Your task, as detailed below, includes reviewing the existing network services and configuration documents to seek
In Requirement Engineering Introspection is an software Requirement Elicitation Technique. This tutorial Will provide you information on following topics.
1.Requirement Engineering
2. Requirement Elicitation
3. Requirement Elicitation Techniques
4. Introspection
5. When it is Appropriate
6. Effective
7. Pros and Cons
8. Conclusion
Starting the Small Case: Technical ConsiderationsMuruga J
cP-DocRev is a comprehensive web based document management and linear review platform allowing you to you control your data, work with variety of formats, including native files and image sources.
ONetOnline.org - The O*NET program is the nation's primary source of occupational information providing a framework that identifies the most important types of information about work.
Software architecture for developers by Simon BrownCodemotion
The agile and software craftsmanship movements are pushing up the quality of the software systems we build, but there’s more we can do because even a small amount of software architecture can prevent many of the problems that projects still face, particularly if the team seems to be more chaotic than they are self-organising. Successful software projects aren’t just about good code and sometimes you need to step away from the IDE for a few moments to see the bigger picture. This session is about that bigger picture, software architecture, technical leadership and the balance with agility.
For more classes visit
www.snaptutorial.com
Scenario: As an IT administrator for your organization, your supervisor has given you an assignment to review and evaluate ways for improving the network for International Plastics. Your task, as detailed below, includes reviewing the existing network services and configuration documents to seek
In Requirement Engineering Introspection is an software Requirement Elicitation Technique. This tutorial Will provide you information on following topics.
1.Requirement Engineering
2. Requirement Elicitation
3. Requirement Elicitation Techniques
4. Introspection
5. When it is Appropriate
6. Effective
7. Pros and Cons
8. Conclusion
The Future Of Community -
Your online identity, a pseudonym with no connection to your 'government name,' will be as important or more important to you in the future. We're already seeing it happen on Reddit, the age of authenticity is happening, because we as humans crave it and the tools to genuinely connect at scale are finally here. You will find your people; you will find your communities--all of them--online.
Startupfest 2016: ANDY MAURO (Automat) - Lightning KeynoteStartupfest
Are bots ?
Walk through the history of speech recognition, virtual assistants and how bots, which everyone is treating like some flash in the pan fad, has actually been coming for a long time and why bots are important and what they mean for every business
This is a small Presentation on
"Declining Condition of Sports in India"
This presentation you would found
> Self explanatory
> Easy to Understand
> Easy to explain
> Impressive
DevOps unquestionably is one of the most transformational movements to happen to IT and is helping IT deliver to ideas to market faster. But where does one start? What should we focus on first. This infographic explores what are the critical success factors for ensure success with DevOps. A related eBook is available for download at http://info.scriptrock.com/prerequisites-for-devops-success.
Discussion 1 post responses.Please respond to the following.docxcuddietheresa
Discussion 1 post responses.
Please respond to the following:
LG’s post states the following:Top of Form
"When Problem Decomposition is not Easy"
Consider the development of a simple mobile application that displays personal financial management video clips selected from a central repository. Discuss how you would systematically analyze the requirements of this application and identify its problem components.
Using a spiral process of stakeholder engagement which includes understanding the business objectives or needs the application is to provide. Next, looking at the requirements gathering process, whereby sitting with the stakeholders and customers to define those needs, understanding the assumptions and constraints, expectations, and coming up with a conceptual model both from a business and system design. Using the model as a base, the requirements will be developed into a high-level requirement set, where they are broken into the logical grouping, such as business, user, functional, non-functional, and transitional segments. Next, the requirements will be viewed with the stakeholders and customers, to address priority, need vs. want, and addressing any ambiguous requirements to gain clarity for completeness.
Explain how software engineering would help you identify the components and their interconnections.
Software engineering helps identify the components and their interconnections because the approach requires identification of components such as hardware, software, users, tasks, and databases, amongst other pieces to be determined and understand how each will interact with the others. Some boundaries must be known that similar to the scope of a project to help provide a context on what is in or out. It includes things like the activities that will be performed and the entities associated with the activities. Understanding these provide the developers in the design and development process. For example, the above mention contextual design or model can be used or provide a reference to things like architectural design, displaying these components and interconnections on paper (or visual drawing) to help articulate the boundaries, activities, and entities for the system.
Phleeger, S. L., Atlee, J. M. (2009-02-01). Software Engineering: Theory and Practice, 4th Edition [VitalSource Bookshelf version]. Retrieved from vbk://9781323089309
Pochimcherla, A., Pochimcherlahttp, A., & Pochimcherla, A. (2018, January 26). Computer science basics - Decomposition - break a problem into smaller. Retrieved from http://steamism.com/compsci-decomposition/.
SP’s post states the following:Top of Form
"When Problem Decomposition is not Easy" Please respond to the following: Consider the development of a simple mobile application that displays personal financial management video clips selected from a central repository. Discuss how you would systematically analyze the requirements of this application and identify its problem component ...
Consumerization of IT, Cloud Computing, IT as a Service and
Goals of DevOps before establish the 4
1) Understand What The Business Goals Are
2) Get Situational Awareness and Watch for the Drift
3) Clearly Define Processes and Stakeholders
4) How Do You Measure It?
Project OverviewFor your course project, you will be working on .docxbriancrawford30935
Project Overview
For your course project, you will be working on a case study. The details are below.
The Client
Inisope, Inc. is the market leader in disposable dog rain coats. They come on a roll like baggies and use tabs (like diapers) to attach to the bottom of a dog's legs. They come in a variety of sizes. When you get back from the walk, you can simply throw it away with no smelly mess.
The Project
Inisope was founded by Austin Fichtner as a single person business run out of an apartment but has grown to over 2000 employees. However, their I.T. and internal processes have not kept pace with this growth and as a result are a patchwork of different systems and workflows. There are several opportunities for improvement but you'll need to talk to the client to find out just what they need.
The Team
Each team will consist of two members, the architect and the developer. The architect is the project lead and is responsible for project planning, budgeting, high-level design and direct contact with the client. The developer works with the architect on design details, converts functional requirements into a workable design and builds the system. As project lead you will be hiring a developer in Week 1.
Your goal is to produce a pilot system for the client so they can decide whether to go to production. In addition to producing the desired functionality, you will need to estimate time and costs for a production system as well as hardware and software budgets.
NOTE: The architect bills at $150/hr. and the developer bills at $100/hr. You need to track the time each spends on project work so you can present the client with an itemized invoice upon completion.
Further Notes
Your instructor will be taking on the role of the client. With that in mind, when you email them any messages that are for the client should have a subject line that starts with #INISOPE to distinguish them from course-related emails. In addition, a portion of each week's Live Classroom will take the form of a weekly client meeting.
You will need to meet with your team at least once per week. This can be by phone, text messaging, video chat or whatever method works for you both as long as it takes place in real-time (i.e., not email).
Due Date
Your final project is due in Module 06. There will be individual assignments along the way. The module they are due is noted in the time line below.
1
Robert Jamerson
Modeling Transformation
Inisope, Inc., is a very marketable company that should be able to expand its business based on the technological trends for it to grow and be able to handle its client and the number of workers that are in the company. Maintaining the number of customers and workers in the system requires investing on developing a current system that will be in a position to meet the requirement of the user and customer. It should be also cost effective, reliable, easy to use and environmental friendly (Huang, Viti, & Tampère, 2016).
To come up with a system that bri.
Windows XP to Windows 7 Migration WhitepaperLori Witzel
Microsoft will discontinue extended support for Windows XP April 2014, yet more than half the organizations that plan to migrate off Windows XP to Windows 7 have not done so. In this brief whitepaper, you’ll learn more about the “state of migration,” the issues that have slowed migration, and the significant risks incurred by those organizations that fail to migrate from an unsupported operating system. This report reviews the high-level stages in a migration process, and then identifies ways to cut time and costs from migration even if your teams have already started the migration process. These leverage points are clearly identified, and will be useful for all who are not in the very last stages of a Windows XP migration.
Business is always in a constant state of flux- more so these days, with disruption happening all around. How do you move from your AS IS state to TO BE architecture in your enterprise transformational journey? What mix and match of people, processes and technology will you blend together, and in what proportion, to drive enterprise value to deliver transformational results? TOGAF has a suite of tools that can help architects to chalk out the architectural roadmap for enterprise success. This talk will also focus on how agility is an underlying thread in this framework, and how value is delivered incrementally, making the process robust and
bankable.
Key Takeaways
Exposes the audience to the features of TOGAF which help plug business technology gaps.
How TOGAF has agility at its core to drive transformational results.
Why it is a good skill and knowledge for a seasoned IT professional to have in their kitty.
Want to migrate from one technology platform to another?
Seems simple. Done so many times, this initiative still sounds like a deja vu to lot of teams and executives in organizations big and small, flat or hierarchical or matrix management culture.
First principle - Socialize, engage, educate, evangelize and get the buy in of direct and in-direct stakeholders.
How do you go through all that using a disciplined approach?
Check this out. Feel free to contact me for clarifications anytime via info @ ValueRealizationInc.com
2. ABSTRACT
With a rapidly changing and an ever growing IT landscape, there is always a need and room
for improvement for organizations who have adopted IT. Enterprises look for a more
efficient and better way to manage their IT infrastructure. An existing setup needs to go
through a huge transformation to achieve par excellence reputation. These transformation
projects may sometimes take more than a couple of years to reach the desired state. While
working on one of such projects, I came up with an Analysis Questionnaire to help Business
Analysts think in the right direction and understand the concept so clearly, that they are
able to ask the right questions during Requirement Elicitation phase. Unless the right
questions are asked, the information collected cannot be transformed in to knowledge and
in turn, cannot be churned out to produce a Design Strategy. This shall help BA’s to collect
information through one or more of the following Elicitation Techniques: Formal/Structured
Interviews, Shadowing and Workshop sessions.
3. About the AUTHOR
Saurabh Goel has been working in IT industry for 9 years now and has a vast experience in
Banking & Finance domain and Life Sciences & Healthcare domain. He started off as a
developer and gradually moved into Analysis side. He has now worked as a Business Analyst
on numerous projects over the last 5 years including Greenfield & Brownfield projects in
Waterfall, Agile & Reverse Engineering methodologies across the globe.
4. About the DOMAIN
Infrastructure Transformation projects aim at upgrading existing IT infrastructure. These
projects range from a relatively simple upgrade of Operating System platform (say from XP
to Windows 7) to upgrading the entire underlying infrastructure like Data Centre movement
or Outsourcing services to 3rd
party vendors and even laying out a new Network. In such
cases, even before the new strategy is laid out, the existing one should be understood
thoroughly. The existing setup, configurations, networking, security issues and performance
standards should be identified. A new design, then, can be laid out to host the existing
features, include the new ones and retiring the ones that are no longer required. All aspects,
from the lowest level of a user Logging-on to the network (authentication levels) to the
Administrative rights on a particular application must be taken into account.
5. Contents
ABSTRACT................................................................................................................................................2
About the AUTHOR .................................................................................................................................3
About the DOMAIN.................................................................................................................................4
INTRODUCTION.......................................................................................................................................6
QUESTIONNAIRE .....................................................................................................................................7
Questions to Practice Management ...................................................................................................7
Questions to Individual Users.............................................................................................................9
Requirement Elicitation (Initial Phase) ...........................................................................................9
Requirement Clarification (Analysis Phase)..................................................................................11
CONCLUSION.........................................................................................................................................13
6. INTRODUCTION
Infrastructure Transformation projects aim at upgrading existing IT infrastructure. These
projects range from a relatively simple upgrade of Operating System platform (say from XP
to Windows 7) to upgrading the entire underlying infrastructure like Data Centre movement
or even laying out an entirely new Network. In all these cases, even before a new design can
be proposed, a comprehensive understanding of the existing one is vital. This is not limited
to understand what changes are required but also to know what qualifies for retirement and
what readies the organization for the next decade of expansion. The advances in IT
landscape are made at a pace which makes it inevitable for growth hungry businesses to
stay ahead in the game by upgrading themselves.
7. QUESTIONNAIRE
Questions to Practice Management
The second step in the process would be to meet the Leads or Representatives of the
Department(s) or Project(s) that will undergo this transformation. Once you introduce them
to the approach that would be undertaken, you can use the following questionnaire to help
you understand the as-is state of the project from Project’s point-of-view. It is
recommended that you circulate this questionnaire via email (or embed in your meeting
invitation) so that the Leads prepared with relevant information. Although this is quite an
exhaustive list of questions, more can be added depending upon your project needs and
landscape.
What is the number of users to be accommodated in the new infrastructure setup?
What is the current Team Size: at Onshore and at Offshore (as applicable)?
o What is the number of Concurrent Users to be accommodated?
o What is the Month on Month increase in Volume, if available?
What are the existing Disaster Recovery provisions?
o What are the expected Disaster Recovery provisions including percentage of
users to be re-instated immediately in case of a disaster?
What is the current Tolerated Latency?
What should be the Session duration in the new world? This shall clearly state
o Lock-out duration (keeps session alive)
o Time-out duration (application times out, session is alive)
o Log-off duration (session terminated)
o Specific needs for longer durations (say overnight, for batch processing)
Current and expected Availability of the system.
Provisions for Remote Connections:
o To access the solution remotely including offshore team (if applicable)
o Work-from-home exceptions
Details of Persistent/Non-Persistent Sessions (if they exist today) & in the future
state.
8. What are the current provisions for offshore team members (like Printing, RAS
Tokens & Scanners etc.)
Enlist External Devices that should be usable in the new infrastructure
Are there any current Limitations? If yes, please specify.
Licensing details – general information on how licenses are currently managed and if
it’s inclusive of offshore. Apart from this basic information that can be elicited from
respective Leads, the wider piece of the work requires an SME (Subject Matter
Expert) in licensing.
Support mechanism for Existing Infrastructure
o Support Timings
o Support provided by (team contact details)
o Escalations, emergencies and Out of Hours support
9. Questions to Individual Users
Requirement Elicitation (Initial Phase)
Here is the detailed questionnaire that can be used to elicit requirements from individual
users. This can be invariably used during various elicitation techniques like structured
interviews, workshops and shadowing. Although this is quite an exhaustive list of questions,
more can be added depending upon your project needs and landscape.
What is the Rationale of the Application?
What type of Data is used in the application – Customer Data/Account Data/Card
Data?
o This is to determine Security Requirements
o This is to determine Encryption Requirements
o This is to determine Legal Requirements
o This is to determine Non-Disclosure Agreement Terms
o This is to determine Outsourcing Terms and Conditions with 3rd
Party
Vendors (if applicable)
Provide a list of Software currently available/installed on Desktop/Laptop along with
their Versions
o Also specify the Mode of Installation
User Installed by virtue of Administrative Role (either from a Pre-
approved Catalogue or an Internet Download)?
Installed by an Administrator via Remote Desktop Connection?
Auto Installation during scheduled maintenance hours, upon approval
of User Request?
o What is the type of Software: Licensed* or Free/In-House Developed?
*Take up Licencing issues separately, later on
If offshore is involved how are licenses managed?
o If multiple Versions of the same software are required :
Justification of the need of having multiple versions like
backward/forward compatibility with other tools/software
Possibility of retiring older versions and have a common latest version
for all
Plans to upgrade the version for the project or for the organization as
a whole
10. o Does the application connect to a Production System**? For example:
RDP (Remote Desktop Protocol) based direct connection to back-end
server (Development or Production)
Web application to back-end server (Development or Production)
Terminal Emulator
**This is to determine Segregation of Duties (SOD) between
Development and Support profiles, to clearly demarcate the
applications that must run in a controlled Live environment.
o Does the application require access to a Database or Application Server back-
end system like SQL Serverᵠ or SAPᵠ?
Are these Production or Development back-end server names listed
anywhere in the application (hard-coded)?
ᵠIf Database upgrade or migration is in Scope of the project, a
separate questionnaire would be required as that would be
essentially an independent analysis in comparison to Application
migration.
If user(s) is/are using Multiple Desktops? If yes, then justify.
Do users have External Email/Internet Browsing access?
o If yes, is there a segregation between Onshore & offshore users (if applicable)
o Do any of the applications integrate with the email client (say Lotus or
Outlook/Exchange) to send automated messages? Such applications should
(ideally) be marked as Live/Production instances that must run in a controlled
environment.
Do users have Administrative rights on their machine(s)?
o Does the application require changes to the HOSTS file to ‘point’ the
application to Development &/or Production systems?
Access Level of Users - Active Directory or other Groups that they are currently
members of.
Any devices that are used in the network like Signature Pads or Passbook Printers
(this is excluding standard printers and scanners that are available as a default setup)
o If yes, is there a difference in setup for onshore/offshore users? (if applicable)
11. Access to Code Repository – Team Foundation Sever, Microsoft Visual Source Safe or
their equivalent?
Current Hardware Specification – this step may be skipped if there is a standard
being followed or to be followed for all users
What is the Team Size (for the application)?
What is the Team Spread – Onshore/Offshore (for the application)?
If there are Users at Offshore, what is the mode of Infrastructure Access for them
like Remote Connections, Security Restrictions etc.?
What are the Current provisions available to Offshore Users?
Details of Citrix access – Environments accessible via Citrix especially to
Remote/Offshore users
Are there any additional Credentials in use? (e.g. RAXX ID, generic ID’s or Group ID’s)
Platform Usage –
o Say Windows 7 or Windows XP
o Using a Desktop or Laptop
o Virtual Machine or Blade setup
Desktop/Virtual Machine sharing that is observed? If yes, then
o What is the purpose?
o How is it done?
Gather screenshots of Applications (Including Access levels)
Requirement Clarification (Analysis Phase)
If during the Elicitation phase or Assessment/Analysis phase, an application is found which is
not compatible with the target platform (say not supported on Win 7) or violates the SOD
(segregation of duties) criterion or hits any other snag like conflict with another application,
the following questions (in addition to the above questionnaire) will help you in further
analysis. This can also be used to determine priority of rollouts (say Go-Live dates in case of
multiple releases or a single release in a Phased manner) and a limited rollout due to
organizational constraints (like budget) or for the start of testing phase (primarily UAT):
Prioritize Applications as MoSCoW
12. o Must Haves – cannot perform necessary functions to support business
functionality. Delivery of such applications can be treated as one of the Entry
criteria for UAT phase.
o Should Haves – can start delivering without them but would be needed
eventually, to become fully functional. Delivery of such applications can be
treated as one of the Exit criteria for UAT phase.
o Could Haves – applications that should be provided if technically or otherwise
feasible.
o Would Haves – are nice to have applications or tools which are principally to
help perform certain functions but their absence will not impact the delivery
in any way. These are usually entertained if there are resources available to
do so.
In addition to prioritization, it might be helpful to find out the Frequency of Usage, to
know whether a requested app is sparsely used or extensively used.
An alternate Version or Tool that can replace the contested one
Further details sometime help in determining a solution, like:
o Users and Computer names (in case of a lookup or justification)
o Target Location of the App (if shortcuts are used). This primarily helps for URL
based & Remotely Hosted applications. Otherwise, mode of installation of
such Apps.
o Confirm that the requested App is not embedded in a parent App (part of a
package like MS Word comes with MS Office package, Team Foundation
Server Explorer comes with Visual Studio Ultimate 2010)
o Clearly mark the requested Apps which are Not a Service or Interface, in
which case, they are not to be installed but just to be made available. Also
convey that Pre-requisites for an App will be a part of the new platform but
may not be directly visible.
13. CONCLUSION
The way old marketing strategies no longer fit the business purpose, in the same way old
infrastructure does not fit the purpose of sustaining that business growth. In a digital era
where the consumers are craving for faster and smarter personal computers, an
organization cannot lag behind in upgrading its infrastructure and then be left behind in the
competition. Most of the organizations operate on an infrastructure that was built at their
inception catering to the then-business-needs. With trade liberalization and globalization of
economies, the business needs & consumer base has drastically changed. Original
infrastructure cannot handle the high expectations of tech-savvy consumers and must make
way for a state-of-the-art replacement. A newer hardware directly affects the efficiency of
an organization’s Technical Department eventually climbing up to its Business and finally
shows up results in the form of Customer satisfaction.