This presentation provides an overview of the Computer-Aided-Applications-Development (CAAD) methodology for codeless software authoring. This approach is modelled on a workshop process where applications are designed in near-real-time using codeless situational applications software technology.
Introduction to Software Development Life Cycle: Phases & Modelsmanoharparakh
SDLC gives a complete idea about developing, designing, and maintaining a software project ensuring all the functionalities along with user requirements, objectives, and end goals are addressed. Have a look at the PPT to know more.
The software development life cycle, or SDLC, encompasses all of the steps that an organization follows when it develops software tools or applications.
An Automation Culture: The Key to Agile SuccessTechWell
For organizations developing large-scale applications, transitioning to agile is challenging enough. But if your organization has not yet adopted an automation culture, brace yourself for a big surprise because automation is essential to agile success. From the safety nets provided by automated unit and acceptance tests to the automation of build, build verification, and deployment processes, the iterative nature of agile demands a culture of automation across your engineering organization. Geoff Meyer shares lessons learned in adopting a test automation culture as the Dell Enterprise Systems Group simultaneously adopted Scrum and agile processes across its entire software product portfolio. Learn to address the practical challenges of establishing an automation culture at the outset by ensuring that your organizational makeover incorporates changes to your hiring, staffing, and training practices. Find out how you can apply automation beyond the Scrum team in areas of continuous integration, scale and stress testing, and performance testing.
Introduction to Software Development Life Cycle: Phases & Modelsmanoharparakh
SDLC gives a complete idea about developing, designing, and maintaining a software project ensuring all the functionalities along with user requirements, objectives, and end goals are addressed. Have a look at the PPT to know more.
The software development life cycle, or SDLC, encompasses all of the steps that an organization follows when it develops software tools or applications.
An Automation Culture: The Key to Agile SuccessTechWell
For organizations developing large-scale applications, transitioning to agile is challenging enough. But if your organization has not yet adopted an automation culture, brace yourself for a big surprise because automation is essential to agile success. From the safety nets provided by automated unit and acceptance tests to the automation of build, build verification, and deployment processes, the iterative nature of agile demands a culture of automation across your engineering organization. Geoff Meyer shares lessons learned in adopting a test automation culture as the Dell Enterprise Systems Group simultaneously adopted Scrum and agile processes across its entire software product portfolio. Learn to address the practical challenges of establishing an automation culture at the outset by ensuring that your organizational makeover incorporates changes to your hiring, staffing, and training practices. Find out how you can apply automation beyond the Scrum team in areas of continuous integration, scale and stress testing, and performance testing.
Software Development Life Cycle Models | What are Software Process Models ?
Here you are going to know What is Software Development Life Cycle Model or What are Software Process Models?
Software Process Models defines a distinct set of activities, actions, tasks, milestones, and work products that are required to engineer high-quality software...
For more knowledge watch full video...
Video URL:
https://youtu.be/3Lxnn0O3xaM
YouTube Channel URL:
https://www.youtube.com/channel/UCKVvceV1RGXLz0GeesbQnVg
Google+ Page URL:
https://plus.google.com/113458574960966683976/videos?_ga=1.91477722.157526647.1466331425
My Website Link:
http://appsdisaster.blogspot.com/
If you are interested in learning more about topics like this so Please don't forget to like, share, & Subscribe to this channel.
Thanks
Software Process Models | Software Development Process Models | SDLC | Traditional Software Process Models | Waterfall Model Incremental Model | Prototyping Model | Evolutionary Process Model
The waterfall model is a sequential (non-iterative) design process, used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of conception, initiation, analysis, design, construction, testing, production/implementation and maintenance.
Presentation on Mobile DevOps. Presented at MoDevTablet conference on Sept. 14th. Focuses on:
- What is DevOps?
- What are the challenges of DevOps for Mobile?
- Best practices for Mobile DevOps
Blog post: https://sdarchitect.wordpress.com/2012/09/15/slides-for-my-presentation-on-mobile-devops/
Taking AppSec to 11 - BSides Austin 2016Matt Tesauro
Curious how DevOps, Agile and CI/CD ideas can speed up your AppSec program? Here's how it can be done and an example where it lead to a 5x speed/flow improvement.
Software Development Life Cycle Models | What are Software Process Models ?
Here you are going to know What is Software Development Life Cycle Model or What are Software Process Models?
Software Process Models defines a distinct set of activities, actions, tasks, milestones, and work products that are required to engineer high-quality software...
For more knowledge watch full video...
Video URL:
https://youtu.be/3Lxnn0O3xaM
YouTube Channel URL:
https://www.youtube.com/channel/UCKVvceV1RGXLz0GeesbQnVg
Google+ Page URL:
https://plus.google.com/113458574960966683976/videos?_ga=1.91477722.157526647.1466331425
My Website Link:
http://appsdisaster.blogspot.com/
If you are interested in learning more about topics like this so Please don't forget to like, share, & Subscribe to this channel.
Thanks
Software Process Models | Software Development Process Models | SDLC | Traditional Software Process Models | Waterfall Model Incremental Model | Prototyping Model | Evolutionary Process Model
The waterfall model is a sequential (non-iterative) design process, used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of conception, initiation, analysis, design, construction, testing, production/implementation and maintenance.
Presentation on Mobile DevOps. Presented at MoDevTablet conference on Sept. 14th. Focuses on:
- What is DevOps?
- What are the challenges of DevOps for Mobile?
- Best practices for Mobile DevOps
Blog post: https://sdarchitect.wordpress.com/2012/09/15/slides-for-my-presentation-on-mobile-devops/
Taking AppSec to 11 - BSides Austin 2016Matt Tesauro
Curious how DevOps, Agile and CI/CD ideas can speed up your AppSec program? Here's how it can be done and an example where it lead to a 5x speed/flow improvement.
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterMatt Tesauro
Slide deck from AppSec California 2016 + some additional slides.
Abstract:
How many applications are in your company’s portfolio? What’s the headcount for your AppSec team? Whatever your situation is, I am sure the numbers are not in your favor. Its not time to find a new career, it's time to up your game. This talk will cover how to take your small merry band of AppSec professionals and scale it up to a virtual army. By taking the best of DevOps, Agile and CI/CD, you can iteratively up your AppSec game over time and begin your ascent out of the security hole you are in.
The talk covers real world experiences running AppSec groups at two different companies. Rackspace with approximately 4,000+ employees and Pearson with 40,000+. Both have an international presence and far more apps and developers that AppSec staff. The talk covers the key principles to speed and scale up AppSec programs using an AppSec Pipeline as well as practical examples of these practices put into use. Start early and begin to buy down the technical security dept which feels inevitable with more traditional AppSec program thinking.
This presentation includes:
- Why performance matters for digital businesses?
- Use Cases for performance / load testing
- Load Test Design Considerations
- Tools and Technologies
- Methodology and Approach
- Activities and Deliverables
- Load Testing Success Stories
Software Testing includes Performance testing with Load Runner and the JMeter Hima Bindu Kosuru
Basic Testing Concepts.
This Document will help you to learn the main theme of testing
Covered the concepts of Performance testing with Load Runner and the JMeter
Unit_1(Software and Software Engineering).pptxtaxegap762
software enginneering introduction for better understanding brief intoduce software technology and related topics software enginneering introduction for better understanding brief intoduce software technology and related topics
A conversational path helps B2B marketing professionals to align product management, marcomms and sales activities around profitable conversations that produce predictable sales pipelines. Read more at https://newtonday.uk/what-is-conversational-marketing/
This brochure introduces Encanvas Information Flow Designer, software for creating rules-based information flows. With its rich Extract, Transform and Load (ETL) capabilities, Encanvas IFD is an integral part of Encanvas' Robotic Process Automation (RPA) Suite.
This brochure introduces the subject of the Internet of Things (IoT) and explains how Encanvas can bring value to organizations by providing a cockpit to managing devices.
What sort of technical options does Encanvas offer to extend its capabilities with existing technology tools and data sources? Find out in this technical briefing document.
In this White Paper we provide some insights into the differences between Live-Wireframe applications authoring and programming using traditional tools.
For businesses looking to drive their digital transformation with a bi-modal IT (two-speed) approach, the majority are looking to grow DevOps (Development Operations) teams. And those teams will need software to build apps faster than ever before. This data sheet explains how Encanvas meets these needs.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
4. www.encanvas.comwww.encanvas.com
Introduction
Software development is a wasteful process.
Any design exercise assumes a level of ‘trial and error’ but the risks
represented by software authoring are born out in studies both in
terms of slow time to market and burgeoning costs.
The article ‘Why Your IT Project May Be Riskier Than You Think’ by
HBR (November 2011), that followed a survey of 1,471 IT projects
with an average spend of $167m, found that:
• The average overrun was 27%
• One in six of the projects studied was a black swan, with a cost
overrun of 200%.
• Almost 70% of black swan projects also overrun their schedules.
5. www.encanvas.comwww.encanvas.com
About CAAD
• Computer Aided Applications Development (CAAD) is a rapid
method of designing and deploying situational applications
for workgroups and teams.
• It’s computer aided because applications are authored using
a platform that provides pre-formed building blocks of
technology, negating the need for the majority of
programming, testing and re-working associated with former
methods of software authoring.
• It not only makes applications ‘better-fit’ to the community of
users and beneficiaries they’re intended for, but reduces the
time, cost and risk of applications developments.
6. www.encanvas.comwww.encanvas.com
About CAAD
• CAAD methods and tools dramatically reduce the skills-
portfolio needed for authoring applications which means that
one individual can reasonably discharge the entire lifecycle.
• The fact that applications are authored ‘faster’ does not
remove the need for pre-qualification of the use-case, user
needs and benefactor outcome expectations.
• Developments are by necessity scoped using formalized
analysis methods in the PLANNING PHASE comprised of:
1. Outcome Driven Innovation (ODI) based User Role,
purpose and job worth analysis
2. Value Innovation based strategic value analysis
3. RPRS based attribute analysis
10. www.encanvas.comwww.encanvas.com
CAAD Phases and Stages
1. Purpose and Job Worth
2. Strategic Advantage
3. Applications Attributes
Plan1.
4. Workshop Iteration
5. Publish
6. Iterate & User Test (UAT)
Develop2.
7. ReleaseRelease3.
8. Monitor/Report
9. Analyse
10. Recommend
Review4.
11. www.encanvas.comwww.encanvas.com
Process Overview
How it works:
1. A new workspace is created on Encanvas Remote(Spaces)™.
2. (Plan) A business analyst/designer interviews prospective
Users and Stakeholders and defines the scope of the
application and shapes the parameters of the workspace
(data sources, users and user groups), requirements for
records, processes, reports and meta-tables.
3. The business analyst/designer authors a prototype ‘canvas’.
4. (Develop) The business analyst/designer and stakeholders
meet in a workshop and they walk through the canvas
design, iterate the application. Once satisfied with the
outcome the application is published.
12. www.encanvas.comwww.encanvas.com
Process Overview
5. Users test the application and feedback change requests to
the business analyst. Changes are made remotely to the
web-site.
6. (Release) Once the iterations have been completed, the
application is signed off for general release.
7. (Review) Once released, any change requests or technical
bugs are logged against the application and, following
analysis, recommendations for improvement may be made.
14. www.encanvas.comwww.encanvas.com
Platform Characteristics
• Encanvas adopts a similar concept to LEGO™ in the use of
‘ready-made building blocks’ to de-skill the task of software
authoring and makes it possible to design apps in a workshop!
• Look-and-feel parameters are pre-defined using a template to
comply with a corporate standard.
• The design elements of Encanvas are pre-tested for
performance tuning and browser compatibility so there is no
need to conduct a testing/tuning phase.
• All components of Encanvas are built with security provisioning
in mind. This means there’s no risk of security protocols being
unwittingly usurped during the design process.
• Data access security and user permissions management duties
remain under the governance and scrutiny of IT administrators.
15. www.encanvas.comwww.encanvas.com
Installing The Platform
• Encanvas® Remote(Spaces)™ is a proprietary architectural
component of the Encanvas® Secure&Live™ platform.
• It orchestrates the formation of private clouds on-demand
using parameterized configuration settings delivered through
administration tools.
• This technology resides at the Encanvas® data centre and
removes the obstacles of infrastructure setup and
configuration.
16. www.encanvas.comwww.encanvas.com
Protecting Systems
• Encanvas® has been developed on the Microsoft® Web
Platform and inherits all of the advantages of Microsoft’s own
platform security features designed with large enterprises in
mind.
• Encanvas® employs its own Web Server used to orchestrate
the on-demand serving of pages from Microsoft® SQL Server
and other data repositories. This means it’s not possible for
hackers to target static web pages as they do not exist until
served by Encanvas® Web Server™.
• Encanvas’s User Permissions policies are based on the
progressive assignment of permissions unlike other
competitive systems that assign Users a standard level of
permissions to then progressively remove them.
17. www.encanvas.comwww.encanvas.com
Replicating and Scaling Deployments
• Encanvas® is designed to scale painlessly, creating hundreds if
not thousands of applications and workspaces from a single
integrated platform.
• Its Web Server Manager™ cockpit provides administrators
with full visibility over configuration settings.
• All aspects of deployed applications are configured through
parameterized settings negating the need for programming
or the manual setup of operating environments, log files etc.
18. www.encanvas.comwww.encanvas.com
Maintaining The Software Environment
New remote spaces
(applications instances) can
be created by systems
administrators using the
configuration tools of
Encanvas® Remote(Spaces)™
without programming or the
need to setup operating
systems or applications
environments.
Server Computer
The place where computing platforms
are installed.
Client Computer
The place where computing
applications are consumed.
Secure TCIP/IP Service
Secure two-way communications
between computers
TCIP/IP Service
Standard two-way
communications between
computers
20. www.encanvas.comwww.encanvas.com
Introduction
• On the following pages we
describe the constructs of a
typical Encanvas application.
• Note that rarely do
applications include all of the
components described here.
• Depending on the complexity
and number of ‘jobs’
performed, the role of pages
will often merge or may
sometimes not be required.
Start Wizard
Keynote
Landing
Highlights
Workpage
Data Entry (standard, wizard)
Assembly (side-bar, top-down)
Library
Views, Previews and Maps
Reports
Users
Share
Export
Meta
21. www.encanvas.comwww.encanvas.com
Typical Role Terms
• Administrator
– The role responsible for managing the system
infrastructure components
• Sub-Administrator
– The role responsible for managing prescribed
meta-data, user permissions etc.
• Primary User
– The role responsible for actioning the primary
job that defines why the application exists
• Secondary Users
– The role of other users that access the system
normally to view rather than edit.
These are common role
terms used by
designers and analysts
when scoping a new
application.
25. www.encanvas.comwww.encanvas.com
Landing
Role:
• For All Users
• Used as a construct
in larger
applications to
display system
parts usually with
image links
• Helps users to
navigate a complex
system servicing
multiple ‘jobs’
27. www.encanvas.comwww.encanvas.com
Workpage
Role:
• For Primary User Role
• Used to manage day-
to-day activities for
the primary ‘job’
• Rich drill-downs to
assemblies to enable
users to navigate the
system
• See right-hand pane
used for attributes
editing
29. www.encanvas.comwww.encanvas.com
Data Entry (Wizard Based)
Role:
• For Primary User Role
• Used to add new
primary records
where lots of fields
need to be populated
• Streamlines data
entry process for
predictable data entry
workflows
33. www.encanvas.comwww.encanvas.com
Views, Previews and Maps
Role:
• For Admin, Sub-User
and sometimes
Primary User Roles.
• Used to view,
preview or view
maps as part of an
application.
• May include
configuration
options to define
how data is viewed
by public viewers.
35. www.encanvas.comwww.encanvas.com
Users
Role:
• For Sub Admin and
Primary User Roles
• Used to manage User
permissions relating
to the application or
‘staff records’
• Normally treated as
an Assembly page
(note the typical
assembly page layout
of this example)
38. www.encanvas.comwww.encanvas.com
Meta
Role:
• For Sub-Admin Users
• Provides a
contextual ‘single
place’ where Users
go to setup meta
tables relating to an
application or
assembly
• Reduces the number
of forms used within
an application
42. www.encanvas.comwww.encanvas.com
Purpose
• The purpose of this stage is to understand the reasons why
an application development is being considered and to
qualify whether it is really necessary.
• It’s also to qualify the function of the application and what it
‘needs to do’.
1.PurposeandJobWorth
43. www.encanvas.comwww.encanvas.com
About ODI
• Outcome driven Innovation (ODI) is an innovation process
developed by Anthony Ulwick and described in his book
‘What Customers Want: Using Outcome-Driven Innovation’
later popularised by Clayton M. Christensen, Professor of
Business Administration at the Harvard Business School.
• It is built around the belief that people hire products and
services to get a job done.
1.PurposeandJobWorth
44. www.encanvas.comwww.encanvas.com
Applying ODI to Apps Design
The reason why a customer ‘hires’ your
application (goals to be achieved, problems to be
resolved) – the JOB your application does.
Save lives when there’s a fire Fireman
Find relevant content on the internet Search engine
Supply food on the run Fast food restaurant
Heat food to eat Cooker
Correct vision Glasses
1.PurposeandJobWorth
45. www.encanvas.comwww.encanvas.com
Needs are Constant, Solutions Vary
A job statement describes what needs to be done:
• Job statements should not describe mechanisms or platforms
(e.g. “cutting” the grass, “brushing” teeth).
• Job statements should include an Action verb Object of
action and a Contextual qualifier (ODI method) such as
“Teach the reading of English language text”
• Jobs are distinct from products or a solution. It pays to
qualify what the job is before trying to find a way to do it
better (i.e. keep the need separate from the product or
solution).
1.PurposeandJobWorth
46. www.encanvas.comwww.encanvas.com
Method
An interviewer will analyse the jobs done by role holders. Then
he/she will seek to discover how the job can be done better for
each role.
For any activity there may be several role types and it therefore
becomes necessary to interview a number of people performing
each role to ask them:
• What jobs do they do?
• What activities take time to do, or inhibit the job from being done
well? (i.e. posing questions that expose where a sub-optimal
activity exists?
• What inhibitors and constraints prevent them from accomplishing
the job as well as it can be done? (i.e. exposing what customers
thing is the cause of the constraint and qualifying how it could be
improved by doing things better or differently).
1.PurposeandJobWorth
47. www.encanvas.comwww.encanvas.com
Tools
• Capturing insights on roles, jobs and constraints benefits from a
simple framework in the form of a spreadsheet or database
application.
• For each job stage, the data captured should include:
1. User Roles
2. Capabilities (jobs that need doing)
3. Job Outcomes Statements (how the outcome of the job is
measured – such as to “maximize or minimize ‘object’ by
‘value’ + context”)
4. Constraints (what prevents the job being doe better)
5. Corrective Importance (the value of doing the job better to
the role)
1.PurposeandJobWorth
48. www.encanvas.comwww.encanvas.com
• Encanvas Casebook™ provides an online tool-set for creating a Job Card
and Job Definition for a workshop project.
• It establishes a simple project process where milestones can be assigned
and responsibilities allocated. This builds a record of project actions and
contributions to ensure appropriate governance.
• The structure of the Casebook builds a complete picture of requirements
and the desired outcome.
• This knowledge of project activities builds as a casebook for future review
and scrutiny so learning lessons can be captured.
1.PurposeandJobWorth
Tools
49. www.encanvas.comwww.encanvas.com
Outputs
The focus of ODI interviews is to produce a job definition – a
factual account of the job – not how the customer does it, what
tools and platforms they use to achieve it or what they think
about the state of the industry!
The output of this stage is an article that qualifies the job and its
attributes of:
• User Roles
• Job Stages
• Job Outcomes
• Job Constraints
• Corrective Importance
1.PurposeandJobWorth
50. www.encanvas.comwww.encanvas.com
Summary
• To qualify the purpose of an application (ODI) methods
are employed.
• ODI principles pre-suppose that applications are
employed to get a job done better.
• The key questions therefore are:
What are the roles?
What are the jobs?
What constraints exist that prevent the job
being done better (i.e. What takes the time)?
How important is it to overcome the
constraint(s)?
1.PurposeandJobWorth
52. www.encanvas.comwww.encanvas.com
Purpose
• There are many ways organizations can improve their
business processes and systems to work more profitably. The
key question becomes ‘Why this and why now?
• The purpose of this stage is to place a strategic value on a
software development exercise.
2.StrategicAdvantage
53. www.encanvas.comwww.encanvas.com
About Value Innovation
• Value Innovation methods originated from the book ‘Blue
Ocean Strategy’, by W. Chan Kim and Renee Mauborgne
(Harvard Business School Press, 2005)
• In it, the authors observe Value innovation is created in the
region where a company’s actions favourably affect both its
cost structure and its value proposition to buyers.
• Cost savings are made by eliminating and reducing the
factors an industry competes on.
• Buyer value is lifted by raising and creating elements the
industry has never offered. Over time, costs are reduced
further as scale economies kick in due to the high sales
volumes that superior value generates.
2.StrategicAdvantage
54. www.encanvas.comwww.encanvas.com
Method
• The ‘value of innovation’ is quantified by establishing the
impacts of change on targeted customer and stakeholder
actions.
• Key attributes should be qualified in terms of how they
eliminate and reduce costs or raise and create value.
• Each attribute should be assigned a weighted value of
importance (normally a mark out of 10 where 1 is low and 10
is high).
• These values can then be debated with stakeholders and
customers to assign an Innovation Value.
2.StrategicAdvantage
55. www.encanvas.comwww.encanvas.com
Outputs
• Innovation Value can be presented in the form of a strategy
canvas as illustrated below that shows how an application
beats its competition (i.e. the previous method employed to
complete the process).
2.StrategicAdvantage
57. www.encanvas.comwww.encanvas.com
Purpose
Preparing a prototype design not only requires a fundamental
understanding of the job that people are hiring the intended
application to perform, and the roles that contribute to that job, it
also requires a more fundamental picture of:
• Records
• Processes
• Reports
• Settings and data access requirements
The purpose of RPRS Analysis is to document the attributes of an
application so that a prototype design can be easily determined.
3.ApplicationsAttributes
58. www.encanvas.comwww.encanvas.com
Method
• Like ODI, the insights required for RPRS are captured through
interviews with application stakeholders and by benchmarking
existing applications (or competitive applications).
• In order to complete the case-file application design definition,
business analysts/designers will need to qualify:
1. What key content entities exist that will require support in the
form of a record or sub-record?
2. What processes does each user role fulfil (this should come from
ODI)?
3. What reports does each user role require from the application –
and in what format/delivery mechanism?
4. What related data is needed to populate referencing
tables/meta-tables/drop-downs?
3.ApplicationsAttributes
59. www.encanvas.comwww.encanvas.com
Outputs
• Outputs are presented in a case-file (or a spreadsheet when
Encanvas CaseBook™ is not used).
• From these insights a prototype can be formed so that
Workshop discussions can be framed around ‘something’
rather than working from a blank canvas.
3.ApplicationsAttributes
60. www.encanvas.comwww.encanvas.com
Creating A Prototype/Design Concept
• It’s normal for workshops to be pre-empted by the
development of a straw-man prototype. This is to avoid
contributors starting their workshop looking at a blank
canvas!
• The information gained through the job definition and
discovery phase forms the basis of the prototype design.
• This can then be iterated in the workshop phase working
collegiately with stakeholders.
• There is no pressure for the prototype to be ‘perfect’ from
the outset because the activity of iteration engages
stakeholders more into thinking about ‘what will work’.
63. www.encanvas.comwww.encanvas.com
Purpose
The purpose of a Design Workshop is to create an application from
the insights gathered during the planning phase, and with the
active participation of application Users and Stakeholders
Using tools like Encanvas, Users and Stakeholders can be fully
engaged during a workshop while the application being developed
takes shape. The absence of ‘code’ from the design environment
and the use of placeholders for design elements and data/logic
links makes it easy for Workshop participants to envision the end
solution. One click publishing means the outputs of the workshop
are visible and can be reviewed as a ‘live system’.
4.WorkshopIteration
64. www.encanvas.comwww.encanvas.com
Method
1. The scope, value and attributes of the application is pre-agreed from
the outputs of the Planning Phase.
2. A prototype is normally produced prior to the Workshop to provide a
starting point for debate and review.
3. The Workshop is led by an analyst/designer who performs the
‘building’ activities.
4. Each canvas is presented to the participants who discuss the suitability
of the design and provide feedback.
5. The analyst/designer iterates the application design until all feedback
has been adopted or acknowledged as not being appropriate.
6. Once all changes have been made the product is released for User
Testing. If a large amount of changes are needed, a follow-up
workshop may be scheduled.
4.WorkshopIteration
65. www.encanvas.comwww.encanvas.com
The Design Workshop
• A workshop involves an analyst/designer and various
stakeholders and contributors.
• Workshops take the form of a design forum where the initial
prototype is debated by participants and changes are made
iteratively to the design. Some of the changes will be made
immediately.
• Where the design needs considerable iteration, it’s not
uncommon for the workshop to be halted and re-convened
once the bulk of change requests have been applied.
• A project manager may attend to capture the change
requests and ensure the application is progressing towards its
ideal design (consistent to the Casebook outcome definition).
4.WorkshopIteration
66. www.encanvas.comwww.encanvas.com
Publishing the Application
• The outcome of the workshop phase is an application that
stakeholders believe will meet the required need.
• Once an agreement is reached by the project team that the
solution is fit for purpose ‘in principle’ it is made available as
a published application for User Acceptance Testing (UAT).
• There is no significant transition between the pilot phase and
the UAT phase given that the Encanvas platform removes any
need for platform installation, design iteration, testing or
performance tuning.
• There may nevertheless be activities such as the authoring of
help notes and documentation (and the assignment of
permissions, data structures etc.) that can delay UAT by
hours and sometimes days.
4.WorkshopIteration
67. www.encanvas.comwww.encanvas.com
User Testing
• The nature of UAT testing for a situational application is one
of further iteration that extends ‘design’ into a quasi-
operational or alpha-test mode.
• Requests for change by Users are formalized (by using tools
such as Encanvas Casebook™). All User requests are logged
and assigned to a business analyst.
4.WorkshopIteration
68. www.encanvas.comwww.encanvas.com
Documenting the Application
• Most applications require some form of documentation and instructions of
use.
• Documentation may simply to catalogue the existence of the application
and its compliance with information security policies.
• It may also include terms of use and detailed instructions to Users on what
the application is for and how to use the features of the application.
• Increasingly, User guidance is presented on-screen and in the form of help
videos which are easier for Users to learn.
4.WorkshopIteration
69. www.encanvas.comwww.encanvas.com
Making Enhancements
• Each change request received through UAT is reviewed and must be
accepted for adoption by the project manager and business analyst prior to
work being commenced.
• This prevents unnecessary work being adopted before appropriate levels of
sponsorship have been gained.
4.WorkshopIteration
72. www.encanvas.comwww.encanvas.com
Purpose and Output
• The publishing process using Encanvas is painless because it is
a ‘one-click’ activity.
• Publishing an application does not mean that it is released!
• Applications may undergo several rounds of User Testing and
Iteration before being signed off for general release.
• Published applications may still lack documentation and help
notes etc. that will be created as Users become satisfied with
a version of the application.
5.Publish
74. www.encanvas.comwww.encanvas.com
Purpose
The purpose of User Testing is to ensure the applications performs
as it should in operating including:
• Successful delivery of outcomes
• Usability
• Ease of learning/on-boarding for new Users
• Integrity of data model/environment and data connections
• Effectiveness of reporting tools
• Ability of technical staff to support the application
Applications may go through several cycles of User Iteration before
they are judged to be suitable for release. Fortunately, using
platforms like Encanvas, the cost of iteration is extremely low.
6.IterateandUserTest
77. www.encanvas.comwww.encanvas.com
Purpose and Output
Applications are made available for GR once the Designer/Project
Manager is satisfied that:
• Desired outcomes identified in the Planning Phase have been met in
full.
• Change requests identified in the Development Phase have been
completed and no further change requests are being received and the
stakeholders believe the application has reached a point where it is as
good as it’s ever going to get.
• The application is appropriately documented and can be realistically
supported by IT helpdesk staff.
The output of this phase is a released application.
7.Release
80. www.encanvas.comwww.encanvas.com
Providing Day-to-Day User Support
• Even after General Release, Users will often make change
requests for the applications they use. How these are
actioned and delivered will vary according to the design of
the improvement and IT functions within an organization.
• Ordinarily, business analysts will be appointed to support
specific processes or parts of a business and will retain
responsibility for supporting applications in their allocated
support areas.
81. www.encanvas.comwww.encanvas.com
Tools
• Encanvas makes it easier to iterate applications during their life as the
user organization retains complete control over the application and how
it is used within their business.
• The economics of the platform mean that organizations are not penalized
for making changes to their applications as needs change. Neither are
they required to pay version upgrade costs.
• Day-to-day support of applications is made easier by administrators
having access to all deployed applications from a single cockpit (Example:
Encanvas Web Server Manager™).
• The use of a single platform removes many of the complexities of the
deployed environment. It also de-skills the support task so that one
person can support applications in their totality rather than having
multiple support experts managing discrete parts of an application.
82. www.encanvas.comwww.encanvas.com
Tools
• The ability to respond to support requests faster is aided by
Encanvas Version-Rollback™ (VR) technology that ensures
deployed applications and the Encanvas platform will always
remain on a consistent version.
• This obviates the need to load a previous platform version
before correcting a bug or application discrepancy.
84. www.encanvas.comwww.encanvas.com
Purpose and Output
• Business processes and released applications should undergo
continuous analysis and review for their effectiveness and
suitability. It is the nature of business that nothing stays the
same for long and so a review cycle is necessary (and built
into tools like Encanvas Casebook).
• The purpose of the analysis stage is to identify which
processes or applications could be improved through
iteration or new development.
• Analysis data can be aggregated using an application like
Encanvas Casebook or a spreadsheet.
9.Analyze
86. www.encanvas.comwww.encanvas.com
Recommending Changes to Apps
• The purpose of this stage is to make recommendations to
improve applications as the result of analysis conducted on
current and future systems requirements.
• Recommendations are logged using an application like
Encanvas Casebook or a spreadsheet.
10.Recommend
87. www.encanvas.comwww.encanvas.com
Recommending New Apps
• The CAAD process encourages the development of new
situational applications as needs arise.
• This reduces the use of shadow data and shadow systems
(self-served applications normally developed by Users using
SaaS tools or desktop applications like Microsoft® Excel,
PowerPoint, Word or Access)
• Shadow systems are not only a risk to the business, because
of the risk of data loss and non-compliance through errors in
spreadsheets (etc.), but also prohibit the effective re-use of
corporate information assets.
10.Recommend
88. www.encanvas.comwww.encanvas.com
Find out where
innovation takes you
Americas
1330 Avenue of the Americas
New York NY 10019
United States of America
t. 201-777-3398
e. americas@encanvas.com
India
B-41, Sector - 63
Noida - 201301
U.P., India
Delhi Office (US TECH)
t. 0120-4315902
e. asia@encanvas.com
Europe
Dove Cottage Offices
Marcham Road
Abingdon
OX13 6NU
United Kingdom
t. +44 (0) 1865 596151
e. europe@encanvas.com
Africa
Grapevine House
Silverwood Close
Steenberg Office Park
Tokai 7945
South Africa
t. +27 (0) 21 701 3882
e. info.sa@encanvas.com
www.encanvas.com