SlideShare a Scribd company logo
CAPTURING DATA REQUIREMENTS Best Practices in requirements gathering for data rich projects. Presented by: Greg Bhatia (Chief Instructor, MCOM IT Training) Visit us on the web at  www.mcomtraining.com
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],Since 2006, MCOM has trained hundreds of IT professionals in Business Analysis, CRM Data Strategy & Business Intelligence skills. Our unique approach towards  hands-on training  ensures that our students are able to immediately apply the skills & concepts learnt in class, at the workplace.  Greg Bhatia is a professional business analyst with over seven years of experience. He has led successful projects and has been applying business analysis techniques in many large organizations (TD Canada Trust, Microsoft, First Data, Sprint) in   Canada and the USA. Greg has extensive experience in CRM, Business Intelligence, Data warehousing and enterprise  reporting. Visit us on the web at  www.mcomtraining.com
Some Assumptions ,[object Object],[object Object],[object Object]
The Top down requirements process The Fabled Requirements Tree
The Top down requirements process In Reality: The Requirements Tree Stakeholder  Request Functional Non Functional Constraints
The Top down requirements process Stakeholder  Request Functional Non Functional Constraints Use Cases Accessibility Performance …… Software  Specifications Software  Specifications
The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data 1:1 1:1 1:1 1:1 1:1 1:n n:1
Use cases are useful but…
Use cases are useful but… A use case in software engineering and systems engineering is a description of a system’s behavior as it responds to a request that originates from outside of that system. In other words, a use case describes "who" can do "what" with the system in question. The use case technique is used to capture a system's behavioral requirements by detailing scenario-driven threads through the functional requirements. Reference:  http://en.wikipedia.org/wiki/Use_case   HOWEVER….. ,[object Object],[object Object],[object Object]
Use cases are useful but… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use cases are useful but… Stakeholder Intent Development Possibilities [Name],  [Email], [Phone], [Address 1],[Address 2], [City], [Province], [Postal Code] [First Name], [Last Name],  [Email], [Phone], [ Address 1], [Address 2 ], [City], [Province], [Postal Code] [Name],  [Email], [Phone],  [Address],  [City], [Province], [Postal Code] #1 Best case Scenario #2 Scenario #3 Scenario Application captures data in the following format: [First Name], [Last Name], [Email], [Phone], [Address 1], [Address 2], [City], [Province], [Postal Code]
Use cases are useful but… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use cases are useful but… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data, looking beyond the bits & bytes
Data, looking beyond the bits & bytes What is Data? The layman’s definition   (1) Distinct pieces of information, usually formatted in a special way. All software is divided into two general categories: data and programs. Programs are collections of instructions for manipulating data.  Strictly speaking, data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word.  (2) The term data is often used to distinguish binary machine-readable information from textual human-readable information. For example, some applications make a distinction between data files (files that contain binary data) and text files (files that contain ASCII data).  (3) In database management systems, data files are the files that store the database information, whereas other files, such as index files and data dictionaries, store administrative information, known as metadata.
Data, looking beyond the bits & bytes What is Data? The Business Analyst’s definition   A  collection of facts that have been organized and categorized for a pre determined purpose from which conclusions may be drawn;
Data, looking beyond the bits & bytes There is  Rich And then there is  Data Rich
Data, looking beyond the bits & bytes Settle on the best plan, exploit the dynamic within, develop it without. Follow the advantage, and master opportunity General Sun Tzu from  The Art of War 6th century BC
Data, looking beyond the bits & bytes Every Data Requirement discussion is an  opportunity  to enhance the BI capability (current of future) of the organization There is never a better time to have BI focused discussions than when requirements for the data capture systems are being reviewed
Data, looking beyond the bits & bytes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],,[Annual Income], [Gender], [Marital Status], [Language Preference]
Data, looking beyond the bits & bytes [Annual Income] + [Gender]+ [Marital Status] = Predictive Modeling / Data Mining [Language Preference] = Targeted CRM Campaigns PROJECT R.O.I
Why Plan for BI?
Why Plan for BI? Why Do Organizations need Business Intelligence capabilities? Running a business costs money and so organizations need to  maximize their revenue . This  optimization can only be achieved through insight  and it is this insight that is the key benefit a BI  solution delivers to an organization B.I Components Analysis Data Warehouse OLAP Cubes Predictive Models Reporting Ad-hoc reports Balanced Scorecards Dashboards
Why Plan for BI? You can plan ahead, or you can play catch-up BI is the Future, not an after thought
Why Plan for BI? It  Costs time & effort  to plan for BI  in every development initiative * This is an investment * It  Costs money  to re-configure a system to make  It “BI friendly “ * This is a sunk cost * … and you still  don’t get the full benefit  of a BI solution due to  missing Historical data
Why Plan for BI? Best Practices for BI Planning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive…
Data discovery – Ask and ye shall receive… One of the biggest challenges facing IT organizations is pinpointing the  location of critical data throughout the enterprise.   A  lot of time is wasted  in trying to identify data sources, owners and data capture strategies, time which is  better spent in Requirements Analysis Delaying the data discovery phase only makes the problem worse
Data discovery – Ask and ye shall receive… DATA DISCOVERY – COMMON PITFALLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive… DATA DISCOVERY – COMMON PITFALLS (Contd.) ,[object Object],[object Object],CAPTURING  INSUFFECIENT  OR  WRONG  DATA IS  WORSE  THAN NOT CAPTURING ANY DATA ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive… Asking the right questions is important ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive… Asking the right questions to the right people is equally important Question:   Is the data refreshed on a daily basis or weekly basis? Qualified Audience:  Data owner, Data SME Question:   We need to build an automated ETL pipe from this data source into our application. What would be the cost & timelines? Qualified Audience:  Data owner, Question:   What fields need to be captured in the data feed? Qualified Audience:  Business SME / Stakeholder / BI Champion Question:   At what grain should we capture the data? Qualified Audience:  BI Champion
Parting Thoughts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You for Attending For all your  Individual & Corporate Training  Needs Visit us on the web at  www.mcomtraining.com
QUESTIONS & ANSWERS

More Related Content

What's hot

03. Business Information Requirements Template
03. Business Information Requirements Template03. Business Information Requirements Template
03. Business Information Requirements Template
Alan D. Duncan
 
Best Practices in Metadata Management
Best Practices in Metadata ManagementBest Practices in Metadata Management
Best Practices in Metadata Management
DATAVERSITY
 
Data Governance Best Practices, Assessments, and Roadmaps
Data Governance Best Practices, Assessments, and RoadmapsData Governance Best Practices, Assessments, and Roadmaps
Data Governance Best Practices, Assessments, and Roadmaps
DATAVERSITY
 
Data Lakehouse, Data Mesh, and Data Fabric (r1)
Data Lakehouse, Data Mesh, and Data Fabric (r1)Data Lakehouse, Data Mesh, and Data Fabric (r1)
Data Lakehouse, Data Mesh, and Data Fabric (r1)
James Serra
 
Example data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEWExample data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEW
Alan D. Duncan
 
Building a Data Governance Strategy
Building a Data Governance StrategyBuilding a Data Governance Strategy
Building a Data Governance Strategy
Analytics8
 
Data Governance and Metadata Management
Data Governance and Metadata ManagementData Governance and Metadata Management
Data Governance and Metadata Management
DATAVERSITY
 
Enterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureEnterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data Architecture
DATAVERSITY
 
Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...
Alan McSweeney
 
White Paper - Data Warehouse Documentation Roadmap
White Paper -  Data Warehouse Documentation RoadmapWhite Paper -  Data Warehouse Documentation Roadmap
White Paper - Data Warehouse Documentation Roadmap
David Walker
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity Models
Alan McSweeney
 
Gathering And Documenting Your Bi Business Requirements
Gathering And Documenting Your Bi Business RequirementsGathering And Documenting Your Bi Business Requirements
Gathering And Documenting Your Bi Business Requirements
Wynyard Group
 
How to build a successful Data Lake
How to build a successful Data LakeHow to build a successful Data Lake
How to build a successful Data Lake
DataWorks Summit/Hadoop Summit
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
Precisely
 
Data Modeling, Data Governance, & Data Quality
Data Modeling, Data Governance, & Data QualityData Modeling, Data Governance, & Data Quality
Data Modeling, Data Governance, & Data Quality
DATAVERSITY
 
Building A Bi Strategy
Building A Bi StrategyBuilding A Bi Strategy
Building A Bi Strategy
larryzagata
 
Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdf
Alan McSweeney
 
Master Data Management - Aligning Data, Process, and Governance
Master Data Management - Aligning Data, Process, and GovernanceMaster Data Management - Aligning Data, Process, and Governance
Master Data Management - Aligning Data, Process, and Governance
DATAVERSITY
 
DAS Slides: Building a Data Strategy - Practical Steps for Aligning with Busi...
DAS Slides: Building a Data Strategy - Practical Steps for Aligning with Busi...DAS Slides: Building a Data Strategy - Practical Steps for Aligning with Busi...
DAS Slides: Building a Data Strategy - Practical Steps for Aligning with Busi...
DATAVERSITY
 
Strategic Business Requirements for Master Data Management Systems
Strategic Business Requirements for Master Data Management SystemsStrategic Business Requirements for Master Data Management Systems
Strategic Business Requirements for Master Data Management Systems
Boris Otto
 

What's hot (20)

03. Business Information Requirements Template
03. Business Information Requirements Template03. Business Information Requirements Template
03. Business Information Requirements Template
 
Best Practices in Metadata Management
Best Practices in Metadata ManagementBest Practices in Metadata Management
Best Practices in Metadata Management
 
Data Governance Best Practices, Assessments, and Roadmaps
Data Governance Best Practices, Assessments, and RoadmapsData Governance Best Practices, Assessments, and Roadmaps
Data Governance Best Practices, Assessments, and Roadmaps
 
Data Lakehouse, Data Mesh, and Data Fabric (r1)
Data Lakehouse, Data Mesh, and Data Fabric (r1)Data Lakehouse, Data Mesh, and Data Fabric (r1)
Data Lakehouse, Data Mesh, and Data Fabric (r1)
 
Example data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEWExample data specifications and info requirements framework OVERVIEW
Example data specifications and info requirements framework OVERVIEW
 
Building a Data Governance Strategy
Building a Data Governance StrategyBuilding a Data Governance Strategy
Building a Data Governance Strategy
 
Data Governance and Metadata Management
Data Governance and Metadata ManagementData Governance and Metadata Management
Data Governance and Metadata Management
 
Enterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureEnterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data Architecture
 
Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...
 
White Paper - Data Warehouse Documentation Roadmap
White Paper -  Data Warehouse Documentation RoadmapWhite Paper -  Data Warehouse Documentation Roadmap
White Paper - Data Warehouse Documentation Roadmap
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity Models
 
Gathering And Documenting Your Bi Business Requirements
Gathering And Documenting Your Bi Business RequirementsGathering And Documenting Your Bi Business Requirements
Gathering And Documenting Your Bi Business Requirements
 
How to build a successful Data Lake
How to build a successful Data LakeHow to build a successful Data Lake
How to build a successful Data Lake
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
 
Data Modeling, Data Governance, & Data Quality
Data Modeling, Data Governance, & Data QualityData Modeling, Data Governance, & Data Quality
Data Modeling, Data Governance, & Data Quality
 
Building A Bi Strategy
Building A Bi StrategyBuilding A Bi Strategy
Building A Bi Strategy
 
Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdf
 
Master Data Management - Aligning Data, Process, and Governance
Master Data Management - Aligning Data, Process, and GovernanceMaster Data Management - Aligning Data, Process, and Governance
Master Data Management - Aligning Data, Process, and Governance
 
DAS Slides: Building a Data Strategy - Practical Steps for Aligning with Busi...
DAS Slides: Building a Data Strategy - Practical Steps for Aligning with Busi...DAS Slides: Building a Data Strategy - Practical Steps for Aligning with Busi...
DAS Slides: Building a Data Strategy - Practical Steps for Aligning with Busi...
 
Strategic Business Requirements for Master Data Management Systems
Strategic Business Requirements for Master Data Management SystemsStrategic Business Requirements for Master Data Management Systems
Strategic Business Requirements for Master Data Management Systems
 

Similar to Capturing Data Requirements

Effectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB ImplementationEffectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB Implementation
Antonio Rolle
 
Acc 340 Preview Full Course
Acc 340 Preview Full CourseAcc 340 Preview Full Course
Acc 340 Preview Full Course
fasthomeworkhelpdotcome
 
1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docx1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docx
drennanmicah
 
Acc 340 Preview Full Course
Acc 340 Preview Full Course Acc 340 Preview Full Course
Acc 340 Preview Full Course
fasthomeworkhelpdotcome
 
Blank Paper To Write On
Blank Paper To Write OnBlank Paper To Write On
Blank Paper To Write On
Kayla Miller
 
Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015Olivier Béghain
 
Overview of business intelligence
Overview of business intelligenceOverview of business intelligence
Overview of business intelligence
Ahsan Kabir
 
Complexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP EnvironmentComplexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP Environment
eprentise
 
IPM Individual Assignment.docx
IPM Individual Assignment.docxIPM Individual Assignment.docx
IPM Individual Assignment.docx
Mikealay Desta
 
Master Data Management methodology
Master Data Management methodologyMaster Data Management methodology
Master Data Management methodology
Database Architechs
 
Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)
Maria Pulsoni-Cicio
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
Andrew White
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture
Hamzazafeer
 
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryAge of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Inside Analysis
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
Mark S. Mahre
 
College management
College managementCollege management
College management
anandhan30
 
Bhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodologyBhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodology
Bhawani N Prasad
 
Integrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s GuideIntegrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Salesforce.org
 
Concurrency Technology Roadmap
Concurrency Technology Roadmap Concurrency Technology Roadmap
Concurrency Technology Roadmap
Concurrency, Inc.
 

Similar to Capturing Data Requirements (20)

Effectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB ImplementationEffectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB Implementation
 
Acc 340 Preview Full Course
Acc 340 Preview Full CourseAcc 340 Preview Full Course
Acc 340 Preview Full Course
 
1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docx1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docx
 
Acc 340 Preview Full Course
Acc 340 Preview Full Course Acc 340 Preview Full Course
Acc 340 Preview Full Course
 
Blank Paper To Write On
Blank Paper To Write OnBlank Paper To Write On
Blank Paper To Write On
 
Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015
 
Data analyst
Data analystData analyst
Data analyst
 
Overview of business intelligence
Overview of business intelligenceOverview of business intelligence
Overview of business intelligence
 
Complexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP EnvironmentComplexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP Environment
 
IPM Individual Assignment.docx
IPM Individual Assignment.docxIPM Individual Assignment.docx
IPM Individual Assignment.docx
 
Master Data Management methodology
Master Data Management methodologyMaster Data Management methodology
Master Data Management methodology
 
Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture
 
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryAge of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide Discovery
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
 
College management
College managementCollege management
College management
 
Bhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodologyBhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodology
 
Integrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s GuideIntegrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s Guide
 
Concurrency Technology Roadmap
Concurrency Technology Roadmap Concurrency Technology Roadmap
Concurrency Technology Roadmap
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Capturing Data Requirements

  • 1. CAPTURING DATA REQUIREMENTS Best Practices in requirements gathering for data rich projects. Presented by: Greg Bhatia (Chief Instructor, MCOM IT Training) Visit us on the web at www.mcomtraining.com
  • 2.
  • 3.
  • 4.
  • 5. The Top down requirements process The Fabled Requirements Tree
  • 6. The Top down requirements process In Reality: The Requirements Tree Stakeholder Request Functional Non Functional Constraints
  • 7. The Top down requirements process Stakeholder Request Functional Non Functional Constraints Use Cases Accessibility Performance …… Software Specifications Software Specifications
  • 8. The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
  • 9. The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
  • 10. The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data 1:1 1:1 1:1 1:1 1:1 1:n n:1
  • 11. Use cases are useful but…
  • 12.
  • 13.
  • 14. Use cases are useful but… Stakeholder Intent Development Possibilities [Name], [Email], [Phone], [Address 1],[Address 2], [City], [Province], [Postal Code] [First Name], [Last Name], [Email], [Phone], [ Address 1], [Address 2 ], [City], [Province], [Postal Code] [Name], [Email], [Phone], [Address], [City], [Province], [Postal Code] #1 Best case Scenario #2 Scenario #3 Scenario Application captures data in the following format: [First Name], [Last Name], [Email], [Phone], [Address 1], [Address 2], [City], [Province], [Postal Code]
  • 15.
  • 16.
  • 17. Data, looking beyond the bits & bytes
  • 18. Data, looking beyond the bits & bytes What is Data? The layman’s definition (1) Distinct pieces of information, usually formatted in a special way. All software is divided into two general categories: data and programs. Programs are collections of instructions for manipulating data. Strictly speaking, data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word. (2) The term data is often used to distinguish binary machine-readable information from textual human-readable information. For example, some applications make a distinction between data files (files that contain binary data) and text files (files that contain ASCII data). (3) In database management systems, data files are the files that store the database information, whereas other files, such as index files and data dictionaries, store administrative information, known as metadata.
  • 19. Data, looking beyond the bits & bytes What is Data? The Business Analyst’s definition A collection of facts that have been organized and categorized for a pre determined purpose from which conclusions may be drawn;
  • 20. Data, looking beyond the bits & bytes There is Rich And then there is Data Rich
  • 21. Data, looking beyond the bits & bytes Settle on the best plan, exploit the dynamic within, develop it without. Follow the advantage, and master opportunity General Sun Tzu from The Art of War 6th century BC
  • 22. Data, looking beyond the bits & bytes Every Data Requirement discussion is an opportunity to enhance the BI capability (current of future) of the organization There is never a better time to have BI focused discussions than when requirements for the data capture systems are being reviewed
  • 23.
  • 24. Data, looking beyond the bits & bytes [Annual Income] + [Gender]+ [Marital Status] = Predictive Modeling / Data Mining [Language Preference] = Targeted CRM Campaigns PROJECT R.O.I
  • 26. Why Plan for BI? Why Do Organizations need Business Intelligence capabilities? Running a business costs money and so organizations need to maximize their revenue . This optimization can only be achieved through insight and it is this insight that is the key benefit a BI solution delivers to an organization B.I Components Analysis Data Warehouse OLAP Cubes Predictive Models Reporting Ad-hoc reports Balanced Scorecards Dashboards
  • 27. Why Plan for BI? You can plan ahead, or you can play catch-up BI is the Future, not an after thought
  • 28. Why Plan for BI? It Costs time & effort to plan for BI in every development initiative * This is an investment * It Costs money to re-configure a system to make It “BI friendly “ * This is a sunk cost * … and you still don’t get the full benefit of a BI solution due to missing Historical data
  • 29.
  • 30. Data discovery – Ask and ye shall receive…
  • 31. Data discovery – Ask and ye shall receive… One of the biggest challenges facing IT organizations is pinpointing the location of critical data throughout the enterprise. A lot of time is wasted in trying to identify data sources, owners and data capture strategies, time which is better spent in Requirements Analysis Delaying the data discovery phase only makes the problem worse
  • 32.
  • 33.
  • 34.
  • 35. Data discovery – Ask and ye shall receive… Asking the right questions to the right people is equally important Question: Is the data refreshed on a daily basis or weekly basis? Qualified Audience: Data owner, Data SME Question: We need to build an automated ETL pipe from this data source into our application. What would be the cost & timelines? Qualified Audience: Data owner, Question: What fields need to be captured in the data feed? Qualified Audience: Business SME / Stakeholder / BI Champion Question: At what grain should we capture the data? Qualified Audience: BI Champion
  • 36.
  • 37. Thank You for Attending For all your Individual & Corporate Training Needs Visit us on the web at www.mcomtraining.com