This document outlines the requirements analysis and capture process for a software project. It includes stakeholder analysis, functional and non-functional requirements, scope analysis, feasibility analysis, and elicitation of requirements. Diagrams are provided to model the system context, configuration, navigation, and swimlanes. High-level use cases are defined using Cockburn tables for adding a user, checking a room, and adding a location with rooms. The goal is to develop a solution to automate and speed up accessing inventory data for an internal customer.
Pruebas de rendimiento de Microsoft Dynamics NAV WhitepaperCLARA CAMPROVIN
Este documento ofrece una guía de dimensionamiento de la infraestructura técnica necesaria, y explica cómo utilizar las pruebas de carga para optimizar Microsoft Dynamics NAV y el hardware para cumplir los requisitos del cliente y del sistema en general.
The document provides a resume for Saurabh Mahajan outlining his professional experience in IT service management, project management, and quality assurance. It details his various roles and responsibilities across different organizations, as well as his certifications in ITIL, PRINCE2, and PMP. The resume highlights his skills in areas like incident and problem management, change management, and schedule management.
Sanitised Project Plan for Project ManagementSandy Clements
This document provides an overview and requirements for the Project Administration Toolkit (Project Tool) application. The Project Tool will allow project managers at Sanitized Company to set up and manage project information for purposes such as client reporting, budgeting, and billing. Key features in the initial Release 1.0 will include creating and modifying projects, setting up project teams and tasks, and assigning team members to tasks. The document outlines functional requirements, database design, security features, testing plans, and risks.
This document provides guidance on implementing the Delegation Framework introduced in PeopleSoft HCM v. 9.0. It discusses registering self-service transactions, setting up delegation permissions and roles, configuring delegation transactions and settings. It also covers delegation self-service and administrator pages and integrating delegation with applications. The document aims to help implement, maintain and develop applications using the delegation framework.
The document provides details about Ezhilarasu Natesan's experience as a business analyst. He has over 5 years of experience in the SDLC process including requirements gathering, analysis, design, development and testing. He has led agile teams as a scrum master on multiple projects for clients like Ford Motor Company. His responsibilities include gathering requirements, writing user stories, testing, documentation and ensuring delivery of project objectives. He has expertise in agile methodologies, software tools and programming languages.
1. This document outlines the rebate processing business process for a company implementing SAP. It describes the types of rebates processed, including quantity rebates, prorata cash rebates, and secondary transport rebates.
2. The business process flow is described, involving calculating rebates in FoxPro and uploading them into SAP via BDC to generate credit notes.
3. Requirements like printing, authorization, legal and interface requirements are listed for implementation in SAP. Gap analysis will identify any requirements that cannot be met by standard SAP.
This document outlines the credit management business process for a company. It describes the current process where credit limits are set by marketing and entered into the system. It exceeds credit limits are identified. It also describes requirements for implementing the process in SAP and mapping the requirements. Gaps between requirements and standard SAP functionality are identified.
Conventional authorization projects are based on a monolithic approach, with a standardized procedure model and a linear sequence of project phases with milestones. In an ideal project, where both the project factors and the final state are known, this approach might go well. But if changes occur during the project, things become more difficult, and the response is often to increase the resources or push the deadline back. Neither is an ideal solution for your project.
In our experience, SAP S/4HANA authorization projects tend to be highly dynamic, due to the lack of a clear overall strategy in the beginning and frequently changing requirements. This is a key reason why such projects fail.
Our SAP experts at SAST SOLUTIONS follow an agile project management approach that is perfectly suited to the complexity and dynamism in SAP S/4HANA projects. Take advantage of our extensive experience and benefit from rapid response times to changing requirements and a continuous optimization process.
Topics of focus:
• Frequent stumbling blocks in SAP S/4HANA authorization projects
• Comparison between “classic” and “agile” project management
• How you can benefit from the SAST project approach
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Pruebas de rendimiento de Microsoft Dynamics NAV WhitepaperCLARA CAMPROVIN
Este documento ofrece una guía de dimensionamiento de la infraestructura técnica necesaria, y explica cómo utilizar las pruebas de carga para optimizar Microsoft Dynamics NAV y el hardware para cumplir los requisitos del cliente y del sistema en general.
The document provides a resume for Saurabh Mahajan outlining his professional experience in IT service management, project management, and quality assurance. It details his various roles and responsibilities across different organizations, as well as his certifications in ITIL, PRINCE2, and PMP. The resume highlights his skills in areas like incident and problem management, change management, and schedule management.
Sanitised Project Plan for Project ManagementSandy Clements
This document provides an overview and requirements for the Project Administration Toolkit (Project Tool) application. The Project Tool will allow project managers at Sanitized Company to set up and manage project information for purposes such as client reporting, budgeting, and billing. Key features in the initial Release 1.0 will include creating and modifying projects, setting up project teams and tasks, and assigning team members to tasks. The document outlines functional requirements, database design, security features, testing plans, and risks.
This document provides guidance on implementing the Delegation Framework introduced in PeopleSoft HCM v. 9.0. It discusses registering self-service transactions, setting up delegation permissions and roles, configuring delegation transactions and settings. It also covers delegation self-service and administrator pages and integrating delegation with applications. The document aims to help implement, maintain and develop applications using the delegation framework.
The document provides details about Ezhilarasu Natesan's experience as a business analyst. He has over 5 years of experience in the SDLC process including requirements gathering, analysis, design, development and testing. He has led agile teams as a scrum master on multiple projects for clients like Ford Motor Company. His responsibilities include gathering requirements, writing user stories, testing, documentation and ensuring delivery of project objectives. He has expertise in agile methodologies, software tools and programming languages.
1. This document outlines the rebate processing business process for a company implementing SAP. It describes the types of rebates processed, including quantity rebates, prorata cash rebates, and secondary transport rebates.
2. The business process flow is described, involving calculating rebates in FoxPro and uploading them into SAP via BDC to generate credit notes.
3. Requirements like printing, authorization, legal and interface requirements are listed for implementation in SAP. Gap analysis will identify any requirements that cannot be met by standard SAP.
This document outlines the credit management business process for a company. It describes the current process where credit limits are set by marketing and entered into the system. It exceeds credit limits are identified. It also describes requirements for implementing the process in SAP and mapping the requirements. Gaps between requirements and standard SAP functionality are identified.
Conventional authorization projects are based on a monolithic approach, with a standardized procedure model and a linear sequence of project phases with milestones. In an ideal project, where both the project factors and the final state are known, this approach might go well. But if changes occur during the project, things become more difficult, and the response is often to increase the resources or push the deadline back. Neither is an ideal solution for your project.
In our experience, SAP S/4HANA authorization projects tend to be highly dynamic, due to the lack of a clear overall strategy in the beginning and frequently changing requirements. This is a key reason why such projects fail.
Our SAP experts at SAST SOLUTIONS follow an agile project management approach that is perfectly suited to the complexity and dynamism in SAP S/4HANA projects. Take advantage of our extensive experience and benefit from rapid response times to changing requirements and a continuous optimization process.
Topics of focus:
• Frequent stumbling blocks in SAP S/4HANA authorization projects
• Comparison between “classic” and “agile” project management
• How you can benefit from the SAST project approach
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The document describes an online railway reservation system project submitted by students. It discusses software engineering principles and methods used to develop the system. It includes UML diagrams like use case, class, sequence, and activity diagrams that were created as part of the analysis and design of the system. It also describes testing done on the project in the form of alpha testing.
This document provides a template for a Business Requirements Document (BRD) to define requirements for a new Widget Interactive Naming System (WINS) project. The summary includes:
- WINS will create a central repository to house widget name records and links across the enterprise to avoid duplication and reduce development time.
- The current process where each team creates widgets independently will be replaced by a new process where WINS validates widget names and updates are tracked.
- Requirements are categorized by priority and functionality, including general requirements for the repository, security, reporting, and usability, as well as non-functional requirements for performance, availability and more.
1. Sandip Basak is a senior test engineer with over 7 years of experience in performance testing, automation testing, and MDM testing. He has led teams and delivered projects for clients in industries such as biotechnology, telecommunications, banking/finance, and insurance.
2. He has extensive experience using tools like LoadRunner, JMeter, Selenium, and databases like Oracle, SQL, and Informatica MDM.
3. He has certifications in areas like ISTQB, Oracle, Big Data and Hadoop fundamentals, and has delivered various projects involving testing strategies, script development, defect tracking, and performance optimization.
Navigate the universe of CI/CD tools.
As the fastest way to production, the CI/CD pipeline is now mainstream among software companies, forming the backbone of the modern DevOps environment. While DevOps handles the culture aspect, CI/CD focuses on the process and tools.
With this guide, we hope to provide a clear overview of the various CI/CD tools categories and give a broad sampling of the various tools that are available.
Clarizen is one of the few applications designed specifically for a SaaS delivery model. Many of Clarizen’s competitors offer hybrid or offline versions that need to be regularly updated or are adopted from offline tools. The SaaS architecture facilitates consistently fast response times, requires little IT intervention, and ensures users always have the latest functionality.
The document provides an experience summary for an individual with over 5 years of experience in software design and development using Java/J2EE, Spring, and Hibernate. It outlines various roles and responsibilities on several projects for clients like PG&E, Morgan Stanley, NCR Corporation, and more. Technical skills include Java, JavaScript, databases, frameworks, testing, and more. Educational background includes a Bachelor's degree in Computer Science.
This document provides a step-by-step procedure for testing an SAP BW solution. It outlines the testing approaches, including unit, integration, functional, and regression testing. It describes testing the connectivity, data flows, objects, and custom code. Challenges include integrating BW with other systems and extensive customization. Reconciliation is performed between BW and source systems like ECC as well as within BW layers and target systems like BOBJ.
JBoss Application Server - Curso JBoss JB366César Pajares
The document provides an overview of JBoss, including:
- JBoss began as an open-source project in 1999 and was later commercialized as Red Hat acquired JBoss and continued developing it as enterprise-grade middleware.
- JBoss offers application server software and other middleware products to help developers build, deploy and manage applications across distributed systems.
- Key benefits of JBoss include its origins in open-source development, high performance, standards compliance and availability of commercial support services.
This document outlines the specifications for implementing a collection processing business process in SAP. It describes the client requirements, including process, printing, authorization, legal, and interface requirements. It also provides details on how the client requirements will be modeled in SAP, including the organizational elements, to-be process flow, and a process flow chart. Any gaps between the client requirements and standard SAP capabilities are identified. The document was created on June 29, 2006 for a project called Pragathi and includes approval from process owners.
The document outlines the phases and steps for implementing a new HRIS system including gathering requirements, creating a project charter and scope, developing a project management plan with a work breakdown structure and schedule, preparing equipment for deployment, training super users, going live with the new system, and conducting final testing and success measurement.
This document discusses efficient software deployment and value realization. It provides an overview of software deployment challenges, including ownership issues, organizational challenges, technical challenges, and other barriers. It emphasizes the importance of measuring both tangible and intangible returns on investment. The document also discusses IBM's software deployment method and roles, including preparing for deployment, executing the deployment plan, and measuring success. It provides endorsements from IBM executives on the importance of successful deployment.
The document discusses SAP implementation, which refers to processes that define a complete method to implement SAP ERP software in an organization. It describes key implementation processes such as project preparation including crafting a solution vision and staffing a technical support organization, sizing and blueprinting including cost analysis and requirements identification, and realization including change management and testing. The implementation of SAP software is a massive operation that brings many changes to an organization and requires a solid implementation method and careful planning and execution of processes.
SAP Business ByDesign 2011- November 2020Green Berry
The document provides a preview of new and changed features coming to SAP Business ByDesign in November 2020. Key points include:
- Traditional Chinese is now available as a solution language.
- A Cloud Print Manager and length check for Global Location Numbers have been added.
- The mobile app now supports the latest Android and iOS versions.
- Search now considers account access restrictions and incident processing requires a status update.
- Blocked products are prevented from new CRM documents to maintain consistency.
The document discusses the differences between generic and custom software development processes. It provides details on key differences such as control over the development process, costs, functionality, architecture, quality considerations, number of functions, and examples of each. Generic software is developed for wide use by many customers, while custom software is developed specifically for an individual client's unique needs. The document also provides a diagram outlining the typical activities and outputs in a software development process, including planning, requirements analysis, design/prototyping, development, testing, deployment, and maintenance.
This document provides an overview of Oracle Advanced Supply Chain Planning (ASCP) training. It outlines the intended audience, related training materials, and how to log into the Oracle Applications. It then describes the ASCP data flow and planning cycle. The document details how to set up important inventory item attributes, planning attributes, lead times, calendars, resources, routing, and supply chain parameters in Oracle Applications. It explains data collection methods and how to define, launch, and copy ASCP plans. The remainder of the document discusses using the Planner Workbench for analysis, simulations, and reports as well as frequently asked questions and constraint-based planning.
Daffodil Software provides IT services including software development, consulting, and staffing. They have expertise in SharePoint development and have developed various custom SharePoint applications and solutions for clients. These include a CRM, project management system, incident management system, document management system, claim management system, and document tracking system. Daffodil has experience delivering SharePoint solutions using various engagement models and has offices in several countries.
This document outlines the business process for tolling at IFFCO, which involves the production and distribution of DAP fertilizer. The distribution department is responsible for dispatching DAP according to movement plans, usually via rail transport paid for by IFFCO. The document specifies client requirements, modeling of the process in SAP, and gaps between requirements and standard SAP functionality that require customization. Key requirements include production, printing, authorization, legal, development, reporting, and interface needs, which are mapped to the SAP model with any non-standard needs listed for modification.
The document outlines steps for establishing formal capacity management in an organization. It argues that real-time monitors are a waste of time and advocates for a proactive approach using tools that can predict potential problems in advance. The key things needed are senior management commitment, process definition, and the right people and tools. Things that don't help include relying only on threshold alerts, dashboards that update too frequently, and disconnected users and suppliers.
Software Engineering in a Quick and Easy way - v1.pdfKAJAL MANDAL
The Most Common must know Software Development life cycle Models. As we discussed in our earlier article on Software Engineering, we have learned about the aspects of Software Engineering and the qualities that it should possess. Now let us move ahead and learn about the models of the software development life cycle. What is a software development life cycle? A software development life cycle, sometimes also called the SDLC life cycle, represents and describes the various activities that are to be performed to build a software product. These activities are grouped into several phases and sequentially linked in order. Hence we can also say, that a software development life cycle is a structured list of activities that are followed to develop software, from the inception to the delivery of the final product. During any phase of the life cycle of development, one or more activities might have to be carried out to start or finish that phase. For example, in the inception phase of actual coding, it is expected that the architectural designing phase is completed. Why software development life cycle model is required? In every model of SDLC, every phase may have its own child life cycle, for every team of a specific skill set. So in an environment of complicated projects and a variety of skill-based teams, it is vital to follow a pre-defined structured process. This creates discipline and maintains decorum in the working culture. All team members are interdependent. Failure of any one team will affect the deliverables of other teams. And all together it might lead to project failures. SDLC also defines entry and exit criteria for every phase. For example, say, if a team member starts coding, assuming that pro-activeness will help finish the project much earlier. This would be the perfect recipe for disaster and project failure. Why? Because, after putting down a month of effort they might realize that the project needs a roving vehicle on Mars to collect data. Unfortunately, the team doesn’t have that with them. So they can not proceed further. That means a feasibility study was not performed before the team started working on deliverables. Which in technical terms, is a breach of SDLC, and hence the loss of effort, or project failure. The team should have done a feasibility study before jumping straight into deliverables. Then they would have realized that the project is not doable, many days in advance. As so, they could have saved some unnecessary effort. Hence it is strongly suggested to follow a methodology, or process while working on complex and team-based projects. It becomes easier for the entire team to work together, support each other, manage, and track the progress of the development. Regardless of the model you follow, SDLC models always ensure smooth delivery, reporting, and chaos-free delivery of the project. Classic Waterfall Model. Prototyping Model. Iterative Waterfall Model. Rapid Action Development. Spiral Model.
Project Proposal Service Center Management softwareAdam Waheed
Service center professional is software which can manage full service life cycle of an organization. The software is a web based application which will be developed on PHP MySQL to solve current problems of Albion service center .This software is very useful for medium and small sized organizations
The document discusses the roles and responsibilities of a business analyst. It explains that a business analyst serves as a bridge between clients and technical teams by understanding client needs, documenting requirements, overseeing project timelines, and ensuring completed systems meet specifications. The business analyst must understand both business and technical aspects of projects to effectively communicate between parties.
The document describes an online railway reservation system project submitted by students. It discusses software engineering principles and methods used to develop the system. It includes UML diagrams like use case, class, sequence, and activity diagrams that were created as part of the analysis and design of the system. It also describes testing done on the project in the form of alpha testing.
This document provides a template for a Business Requirements Document (BRD) to define requirements for a new Widget Interactive Naming System (WINS) project. The summary includes:
- WINS will create a central repository to house widget name records and links across the enterprise to avoid duplication and reduce development time.
- The current process where each team creates widgets independently will be replaced by a new process where WINS validates widget names and updates are tracked.
- Requirements are categorized by priority and functionality, including general requirements for the repository, security, reporting, and usability, as well as non-functional requirements for performance, availability and more.
1. Sandip Basak is a senior test engineer with over 7 years of experience in performance testing, automation testing, and MDM testing. He has led teams and delivered projects for clients in industries such as biotechnology, telecommunications, banking/finance, and insurance.
2. He has extensive experience using tools like LoadRunner, JMeter, Selenium, and databases like Oracle, SQL, and Informatica MDM.
3. He has certifications in areas like ISTQB, Oracle, Big Data and Hadoop fundamentals, and has delivered various projects involving testing strategies, script development, defect tracking, and performance optimization.
Navigate the universe of CI/CD tools.
As the fastest way to production, the CI/CD pipeline is now mainstream among software companies, forming the backbone of the modern DevOps environment. While DevOps handles the culture aspect, CI/CD focuses on the process and tools.
With this guide, we hope to provide a clear overview of the various CI/CD tools categories and give a broad sampling of the various tools that are available.
Clarizen is one of the few applications designed specifically for a SaaS delivery model. Many of Clarizen’s competitors offer hybrid or offline versions that need to be regularly updated or are adopted from offline tools. The SaaS architecture facilitates consistently fast response times, requires little IT intervention, and ensures users always have the latest functionality.
The document provides an experience summary for an individual with over 5 years of experience in software design and development using Java/J2EE, Spring, and Hibernate. It outlines various roles and responsibilities on several projects for clients like PG&E, Morgan Stanley, NCR Corporation, and more. Technical skills include Java, JavaScript, databases, frameworks, testing, and more. Educational background includes a Bachelor's degree in Computer Science.
This document provides a step-by-step procedure for testing an SAP BW solution. It outlines the testing approaches, including unit, integration, functional, and regression testing. It describes testing the connectivity, data flows, objects, and custom code. Challenges include integrating BW with other systems and extensive customization. Reconciliation is performed between BW and source systems like ECC as well as within BW layers and target systems like BOBJ.
JBoss Application Server - Curso JBoss JB366César Pajares
The document provides an overview of JBoss, including:
- JBoss began as an open-source project in 1999 and was later commercialized as Red Hat acquired JBoss and continued developing it as enterprise-grade middleware.
- JBoss offers application server software and other middleware products to help developers build, deploy and manage applications across distributed systems.
- Key benefits of JBoss include its origins in open-source development, high performance, standards compliance and availability of commercial support services.
This document outlines the specifications for implementing a collection processing business process in SAP. It describes the client requirements, including process, printing, authorization, legal, and interface requirements. It also provides details on how the client requirements will be modeled in SAP, including the organizational elements, to-be process flow, and a process flow chart. Any gaps between the client requirements and standard SAP capabilities are identified. The document was created on June 29, 2006 for a project called Pragathi and includes approval from process owners.
The document outlines the phases and steps for implementing a new HRIS system including gathering requirements, creating a project charter and scope, developing a project management plan with a work breakdown structure and schedule, preparing equipment for deployment, training super users, going live with the new system, and conducting final testing and success measurement.
This document discusses efficient software deployment and value realization. It provides an overview of software deployment challenges, including ownership issues, organizational challenges, technical challenges, and other barriers. It emphasizes the importance of measuring both tangible and intangible returns on investment. The document also discusses IBM's software deployment method and roles, including preparing for deployment, executing the deployment plan, and measuring success. It provides endorsements from IBM executives on the importance of successful deployment.
The document discusses SAP implementation, which refers to processes that define a complete method to implement SAP ERP software in an organization. It describes key implementation processes such as project preparation including crafting a solution vision and staffing a technical support organization, sizing and blueprinting including cost analysis and requirements identification, and realization including change management and testing. The implementation of SAP software is a massive operation that brings many changes to an organization and requires a solid implementation method and careful planning and execution of processes.
SAP Business ByDesign 2011- November 2020Green Berry
The document provides a preview of new and changed features coming to SAP Business ByDesign in November 2020. Key points include:
- Traditional Chinese is now available as a solution language.
- A Cloud Print Manager and length check for Global Location Numbers have been added.
- The mobile app now supports the latest Android and iOS versions.
- Search now considers account access restrictions and incident processing requires a status update.
- Blocked products are prevented from new CRM documents to maintain consistency.
The document discusses the differences between generic and custom software development processes. It provides details on key differences such as control over the development process, costs, functionality, architecture, quality considerations, number of functions, and examples of each. Generic software is developed for wide use by many customers, while custom software is developed specifically for an individual client's unique needs. The document also provides a diagram outlining the typical activities and outputs in a software development process, including planning, requirements analysis, design/prototyping, development, testing, deployment, and maintenance.
This document provides an overview of Oracle Advanced Supply Chain Planning (ASCP) training. It outlines the intended audience, related training materials, and how to log into the Oracle Applications. It then describes the ASCP data flow and planning cycle. The document details how to set up important inventory item attributes, planning attributes, lead times, calendars, resources, routing, and supply chain parameters in Oracle Applications. It explains data collection methods and how to define, launch, and copy ASCP plans. The remainder of the document discusses using the Planner Workbench for analysis, simulations, and reports as well as frequently asked questions and constraint-based planning.
Daffodil Software provides IT services including software development, consulting, and staffing. They have expertise in SharePoint development and have developed various custom SharePoint applications and solutions for clients. These include a CRM, project management system, incident management system, document management system, claim management system, and document tracking system. Daffodil has experience delivering SharePoint solutions using various engagement models and has offices in several countries.
This document outlines the business process for tolling at IFFCO, which involves the production and distribution of DAP fertilizer. The distribution department is responsible for dispatching DAP according to movement plans, usually via rail transport paid for by IFFCO. The document specifies client requirements, modeling of the process in SAP, and gaps between requirements and standard SAP functionality that require customization. Key requirements include production, printing, authorization, legal, development, reporting, and interface needs, which are mapped to the SAP model with any non-standard needs listed for modification.
The document outlines steps for establishing formal capacity management in an organization. It argues that real-time monitors are a waste of time and advocates for a proactive approach using tools that can predict potential problems in advance. The key things needed are senior management commitment, process definition, and the right people and tools. Things that don't help include relying only on threshold alerts, dashboards that update too frequently, and disconnected users and suppliers.
Software Engineering in a Quick and Easy way - v1.pdfKAJAL MANDAL
The Most Common must know Software Development life cycle Models. As we discussed in our earlier article on Software Engineering, we have learned about the aspects of Software Engineering and the qualities that it should possess. Now let us move ahead and learn about the models of the software development life cycle. What is a software development life cycle? A software development life cycle, sometimes also called the SDLC life cycle, represents and describes the various activities that are to be performed to build a software product. These activities are grouped into several phases and sequentially linked in order. Hence we can also say, that a software development life cycle is a structured list of activities that are followed to develop software, from the inception to the delivery of the final product. During any phase of the life cycle of development, one or more activities might have to be carried out to start or finish that phase. For example, in the inception phase of actual coding, it is expected that the architectural designing phase is completed. Why software development life cycle model is required? In every model of SDLC, every phase may have its own child life cycle, for every team of a specific skill set. So in an environment of complicated projects and a variety of skill-based teams, it is vital to follow a pre-defined structured process. This creates discipline and maintains decorum in the working culture. All team members are interdependent. Failure of any one team will affect the deliverables of other teams. And all together it might lead to project failures. SDLC also defines entry and exit criteria for every phase. For example, say, if a team member starts coding, assuming that pro-activeness will help finish the project much earlier. This would be the perfect recipe for disaster and project failure. Why? Because, after putting down a month of effort they might realize that the project needs a roving vehicle on Mars to collect data. Unfortunately, the team doesn’t have that with them. So they can not proceed further. That means a feasibility study was not performed before the team started working on deliverables. Which in technical terms, is a breach of SDLC, and hence the loss of effort, or project failure. The team should have done a feasibility study before jumping straight into deliverables. Then they would have realized that the project is not doable, many days in advance. As so, they could have saved some unnecessary effort. Hence it is strongly suggested to follow a methodology, or process while working on complex and team-based projects. It becomes easier for the entire team to work together, support each other, manage, and track the progress of the development. Regardless of the model you follow, SDLC models always ensure smooth delivery, reporting, and chaos-free delivery of the project. Classic Waterfall Model. Prototyping Model. Iterative Waterfall Model. Rapid Action Development. Spiral Model.
Project Proposal Service Center Management softwareAdam Waheed
Service center professional is software which can manage full service life cycle of an organization. The software is a web based application which will be developed on PHP MySQL to solve current problems of Albion service center .This software is very useful for medium and small sized organizations
The document discusses the roles and responsibilities of a business analyst. It explains that a business analyst serves as a bridge between clients and technical teams by understanding client needs, documenting requirements, overseeing project timelines, and ensuring completed systems meet specifications. The business analyst must understand both business and technical aspects of projects to effectively communicate between parties.
The development of software is planned in stages and steps that culminate in the construction of functional applications of software. As a start-up, you are a new bug in this competitive industry.
The document provides information on various software versions used for engineering drawings, documents, technical illustrations, web browsing and document viewing. It lists applications such as AutoCAD, CorelDRAW, Microsoft Office, Netscape Navigator and Acrobat software. It also provides a link for an up-to-date list of software versions.
The document provides an overview of the Software Development Life Cycle (SDLC) and popular software development methodologies. It describes the SDLC model which includes requirements analysis, design, coding, testing, and maintenance. It also summarizes three other models: the prototyping model which uses iterative prototyping and customer feedback; the Rapid Application Development (RAD) model which emphasizes short development cycles and component reuse; and the component assembly model which develops software from reusable components.
The document discusses the Software Development Life Cycle (SDLC), which is a framework for developing software in a systematic and efficient manner. It involves several phases from planning and requirements analysis to development, testing, deployment, and maintenance. SDLC helps estimate timelines, test software thoroughly, and develop applications in a disciplined way. The key phases include initiation, planning, requirements analysis, design, development, integration and testing, implementation, deployment, and maintenance.
Sap performance testing best practice guidev1 0-130121141448-phpapp02Kamalaksha Das
This document provides best practices for performance testing SAP applications. It discusses planning activities like identifying business processes, test environments, and data requirements. It also outlines the testing methodology including building test scripts, executing tests in silos and combined, and monitoring performance. Key aspects covered are setting up the test lab infrastructure, simulating different types of users and workloads, and analyzing metrics and results. The goal is to guide others in effectively planning and executing SAP performance testing.
Sapperformancetestingbestpracticeguidev1 0-130121141448-phpapp02Pompee Das
This document provides best practices for performance testing SAP applications. It discusses planning activities like identifying business processes, test environments, and data requirements. It also outlines the testing methodology including building test scripts, executing tests in silos and combined, and monitoring performance. Key aspects covered are setting up the test lab infrastructure, simulating different types of users and workloads, and analyzing metrics and results. The goal is to guide others in effectively planning and executing SAP performance testing.
SAP Performance Testing Best Practice Guide v1.0Argos
This document provides best practices for performance testing SAP R3 applications. It outlines the key phases of performance testing including planning, building test scripts, execution, and analysis. The planning phase involves identifying critical transactions, volumes, user loads, and environments. Test scripts are built to simulate user workflows and transactions. Execution involves running tests in silos for online and batch processes, as well as combined. Various SAP monitors and tools are used for analysis to evaluate system performance against service level objectives. The best practices covered aim to help ensure effective performance testing of SAP applications.
Basavaraj Patil has over 11 years of experience in software development and project management using Agile methodologies like Scrum and Kanban. He is a certified Scrum Master and SAFe Agilist. Currently working as an Application Development Manager at Accenture, he has previously worked at Robert Bosch and Mindtree. He has extensive experience leading teams, managing projects, and transforming teams to implement Agile practices. His technical skills include Java, Struts, Hibernate, and he has worked on healthcare, telemedicine and other projects.
The document discusses what a custom software blueprint is. It is a detailed plan that outlines the specific structure, components, and functionalities of custom software tailored to a client's unique needs. It serves as a roadmap for building the software and ensures all stakeholders understand the design and behavior. A custom software blueprint will include an application overview, user experience design, high-level architecture, implementation approach, and project timeline. The blueprint provides clarity on requirements, effective communication, and numerous other benefits throughout the development process such as reduced risks, scalability, optimized costs and timelines, consistent code quality, and client satisfaction.
IQR provides data analytics, software development, and IT services to help clients make better decisions, operate more efficiently, and leverage their data and information assets. IQR's packaged services include marketing automation, process automation, integration testing, content management, and more. IQR aims to attract and retain exceptional people to better serve clients' needs through analytical effectiveness, business understanding, and cost-effective resources.
This document describes a library management system project that was developed to help book stall owners manage their inventory. The project objectives were for students to apply programming skills to solve a real-world problem. Key phases of the project included planning, requirements analysis, design, and installation. Detailed descriptions are provided for each phase of developing the software.
This document describes a library management system project that was developed to help book stall owners manage their inventory. The project objectives were for students to apply programming skills to solve a real-world problem. Key phases of the project included planning, requirements analysis, design, and installation. Detailed descriptions are provided of each phase and how they contribute to the overall development of the software.
The document discusses the Software Development Life Cycle (SDLC) which is a process used by the software industry to design, develop, and test high-quality software. It describes several SDLC models including waterfall, iterative, spiral, V-model, and big bang. The different models are used depending on factors like requirements clarity, time and budget constraints, and technology maturity.
CASE tools are programs that automate and support various phases of the software development life cycle. They include components like a central repository to store diagrams and reports, diagramming tools, documentation tools, and code generation tools. CASE tools can improve software quality, reduce errors, standardize processes, and speed up development times. Some examples of CASE tools include programming tools, documentation tools, diagramming tools, and requirement tracing tools.
Different Methodologies Used By Programming TeamsNicole Gomez
The document discusses different programming team methodologies including:
- System development life cycle (SDLC), which is used for large projects and includes waterfall models. It takes time but ensures high quality.
- Agile methodology, designed for small projects, combines methods for faster development that changes with customer needs.
- Extreme programming allows close communication between developers and customers so the software can change rapidly based on customer feedback.
Overall agile methodologies seem to have advantages over SDLC and extreme programming by allowing faster development that can change with customer desires.
Similar to Software design and development - Requirements analysis and capture (20)
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfVALiNTRY360
Salesforce Healthcare CRM, implemented by VALiNTRY360, revolutionizes patient management by enhancing patient engagement, streamlining administrative processes, and improving care coordination. Its advanced analytics, robust security, and seamless integration with telehealth services ensure that healthcare providers can deliver personalized, efficient, and secure patient care. By automating routine tasks and providing actionable insights, Salesforce Healthcare CRM enables healthcare providers to focus on delivering high-quality care, leading to better patient outcomes and higher satisfaction. VALiNTRY360's expertise ensures a tailored solution that meets the unique needs of any healthcare practice, from small clinics to large hospital systems.
For more info visit us https://valintry360.com/solutions/health-life-sciences
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
14 th Edition of International conference on computer visionShulagnaSarkar2
About the event
14th Edition of International conference on computer vision
Computer conferences organized by ScienceFather group. ScienceFather takes the privilege to invite speakers participants students delegates and exhibitors from across the globe to its International Conference on computer conferences to be held in the Various Beautiful cites of the world. computer conferences are a discussion of common Inventions-related issues and additionally trade information share proof thoughts and insight into advanced developments in the science inventions service system. New technology may create many materials and devices with a vast range of applications such as in Science medicine electronics biomaterials energy production and consumer products.
Nomination are Open!! Don't Miss it
Visit: computer.scifat.com
Award Nomination: https://x-i.me/ishnom
Conference Submission: https://x-i.me/anicon
For Enquiry: Computer@scifat.com
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsPeter Muessig
The UI5 tooling is the development and build tooling of UI5. It is built in a modular and extensible way so that it can be easily extended by your needs. This session will showcase various tooling extensions which can boost your development experience by far so that you can really work offline, transpile your code in your project to use even newer versions of EcmaScript (than 2022 which is supported right now by the UI5 tooling), consume any npm package of your choice in your project, using different kind of proxies, and even stitching UI5 projects during development together to mimic your target environment.
Project Management: The Role of Project Dashboards.pdfKarya Keeper
Project management is a crucial aspect of any organization, ensuring that projects are completed efficiently and effectively. One of the key tools used in project management is the project dashboard, which provides a comprehensive view of project progress and performance. In this article, we will explore the role of project dashboards in project management, highlighting their key features and benefits.
Hand Rolled Applicative User ValidationCode KataPhilip Schwarz
Could you use a simple piece of Scala validation code (granted, a very simplistic one too!) that you can rewrite, now and again, to refresh your basic understanding of Applicative operators <*>, <*, *>?
The goal is not to write perfect code showcasing validation, but rather, to provide a small, rough-and ready exercise to reinforce your muscle-memory.
Despite its grandiose-sounding title, this deck consists of just three slides showing the Scala 3 code to be rewritten whenever the details of the operators begin to fade away.
The code is my rough and ready translation of a Haskell user-validation program found in a book called Finding Success (and Failure) in Haskell - Fall in love with applicative functors.
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
Consistent toolbox talks are critical for maintaining workplace safety, as they provide regular opportunities to address specific hazards and reinforce safe practices.
These brief, focused sessions ensure that safety is a continual conversation rather than a one-time event, which helps keep safety protocols fresh in employees' minds. Studies have shown that shorter, more frequent training sessions are more effective for retention and behavior change compared to longer, infrequent sessions.
Engaging workers regularly, toolbox talks promote a culture of safety, empower employees to voice concerns, and ultimately reduce the likelihood of accidents and injuries on site.
The traditional method of conducting safety talks with paper documents and lengthy meetings is not only time-consuming but also less effective. Manual tracking of attendance and compliance is prone to errors and inconsistencies, leading to gaps in safety communication and potential non-compliance with OSHA regulations. Switching to a digital solution like Safelyio offers significant advantages.
Safelyio automates the delivery and documentation of safety talks, ensuring consistency and accessibility. The microlearning approach breaks down complex safety protocols into manageable, bite-sized pieces, making it easier for employees to absorb and retain information.
This method minimizes disruptions to work schedules, eliminates the hassle of paperwork, and ensures that all safety communications are tracked and recorded accurately. Ultimately, using a digital platform like Safelyio enhances engagement, compliance, and overall safety performance on site. https://safelyio.com/
Unveiling the Advantages of Agile Software Development.pdfbrainerhub1
Learn about Agile Software Development's advantages. Simplify your workflow to spur quicker innovation. Jump right in! We have also discussed the advantages.
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
What to do when you have a perfect model for your software but you are constrained by an imperfect business model?
This talk explores the challenges of bringing modelling rigour to the business and strategy levels, and talking to your non-technical counterparts in the process.
Oracle Database 19c New Features for DBAs and Developers.pptx
Software design and development - Requirements analysis and capture
1. S195215 13
REQUIREMENTS
ANALYSIS AND
CAPTURE
Software Design and Development Part 1
S195215
S195215@uos.ac.uk
Abstract
A requirements specification and supportingrequirements modellingmaterial,includingHigh Level Use
Cases,System Context Diagrams,Functional/Non-Functional Requirements Table, SwimlaneDiagram
and Interaction Models. This includes the requirements development and design process of the
specified softwaresolution.
2. S195215 1
Tableof Contents
Vision Statement......................................................................................................................................................................3
Team Leader Meeting .............................................................................................................................................................3
Idea Proposal........................................................................................................................................................................3
Initial System Requirements..................................................................................................................................................3
Stakeholder Analysis ...............................................................................................................................................................3
Stakeholder Table ....................................................................................................................................................................4
Initial Questions and Output: Scope and Feasibility ........................................................................................................4
Internal Network Customer: Tim Game...........................................................................................................................4
Team Leader: Richard Pilkington ......................................................................................................................................4
Scope Analysis...........................................................................................................................................................................5
Project goals .........................................................................................................................................................................5
Functions ...............................................................................................................................................................................5
Deadlines...............................................................................................................................................................................5
Costs.......................................................................................................................................................................................5
Possible Exclusions...............................................................................................................................................................5
Feasibility Analysis ...................................................................................................................................................................6
Understanding the Project .................................................................................................................................................6
Project Management ..........................................................................................................................................................6
Project Operation ................................................................................................................................................................6
Stakeholder Proposal ..............................................................................................................................................................6
Overview ...............................................................................................................................................................................6
Purpose and Focus...............................................................................................................................................................6
Development for Audience.................................................................................................................................................6
Stakeholder Engagement ...................................................................................................................................................6
Functional Requirements .......................................................................................................................................................7
Non-Functional Requirements ..............................................................................................................................................7
Project Risks Table ...................................................................................................................................................................8
Technical Background .............................................................................................................................................................8
Technical Restrictions..............................................................................................................................................................8
Elicitation of requirements .................................................................................................................................................10
System Context Diagram .....................................................................................................................................................11
3. S195215 2
Configuration Modelling......................................................................................................................................................12
Swimlane Diagram ................................................................................................................................................................13
Entity Relationship Diagram ...............................................................................................................................................14
Navigation Questions and Output.....................................................................................................................................15
Internal Networks Customer: Tim Game ......................................................................................................................15
Team Leader: Richard Pilkington ...................................................................................................................................15
Content Questions and Output..........................................................................................................................................15
Internal Networks Customer: Tim Game ......................................................................................................................15
Navigation Modelling ...........................................................................................................................................................16
Customer............................................................................................................................................................................16
Management.....................................................................................................................................................................16
High-level use case: Cockburn Tables ...............................................................................................................................17
Adding A User....................................................................................................................................................................17
Checking A Room ..............................................................................................................................................................18
Adding A Location With Rooms......................................................................................................................................19
Requirements Conclusion....................................................................................................................................................20
Bibliography ...........................................................................................................................................................................21
4. S195215 3
Vision Statement
After a year of being in a software development team, multiple new features have been tested and developed for
our many internal customers in the organisation. The software itself is a centralised inventory system, holding
hundreds of thousandsofspecific data for customers to easily access and update when needed. I knew from my
experience working with databases that I wanted to create a solution to automate and speed up a process of
accessing this data for one of our customers.I understood that to achieve this I would need to actively
participate and communicate with my target customer to deeply understand their problem and develop a fast,
effective solution that is safe and reliable to use. This would encourage me to schedule frequent meetings with
the customer, suggesting a development technique such as ‘agile’ to be used; with flexible release cycles to
ensure the customer is satisfied with each small requirement.
Team Leader Meeting
Following my initial vision for what solution I wanted to pursue,I decided to organise an informal meeting with
my team lead, Richard Pilkington to discuss the situation further, present to him my idea and ask about any
projects I could potentially take on to satisfy this.
Idea Proposal
After discussing my vision with him, Richard Pilkington soon suggested a feature that one of our customers
(Internal Networks) had suggested 2weeks ago to him. This feature was a room checker. Within our team’s
software (Blueprints) we hold large amounts of information on locations; of which have many rooms. These
rooms need scheduled checks performed to ensure they are functioning properly. Internal Networks currently
have to manually search for rooms that need checking in an excel spreadsheet,and manually fill out forms and
send them off to be updated.This overall process can take weeks to complete, suggesting a substantial
inefficiency in the way they work. This feature was postponed due to the nature of the software we currently
develop. Blueprints is an inventory system, Richard Pilkington explained that this complexity would not fit into
our current software and therefore I could develop an external solution that communicates with Blueprints to get
the newest information on locations and rooms. This software would therefore be separate from my team but
would benefit one of our customers without adding complexity to our current software’s code.
Initial System Requirements
Since the previous discussion with my team leader Richard Pilkington, I have developed a better understanding
of the project required for the customer and have decided to analyse what requirements could be necessary for
the development of this project. First requirement I soon identified would be the need for a web solution. The
front end will need to be separate from Blueprints therefore will need to be designed and optimised for th e
purpose of searching and updating rooms. This along with the ability for the populated database to communicate
and interact with the front end would allow the seamless ability for updating and checking rooms by the visiting
customers. Furthermore, with a room checks page seeming likely, it would make sense to accompany this with a
user’s page to control what permissions people have when visiting the solution. These initial ideas will be
developed further after meetings with all the stakeholders have taken place.
Stakeholder Analysis
My main contact and stakeholder would be my team leader Richard Pilkington, because I am going to be the
lone developer of this solution for my current team, therefore developing the solution directly impacts on the
team; both in productivity in current work and customer interaction. In addition, I will stop development for 4
current customers (yet to be determined) over this time period. Along with this my line manager and team
manager will be responsible for the funding of the project, with both of them responsible for allowing the
customers money to be used towards my time on this solution. Due to it being a requested feature by the
customer, this was authorised and once further meetings with my determined stakeholders’ have occurred, full
details on project scope and feasibility will be decided. The most important stakeholder would evidently be the
customer I am developing the solution for, Internal Networks. This is a large group of Network Engineers with
Tim Game being the delivery manager and my main stakeholderfrom Internal Networks, representing the larger
customer base. Furthermore, Gary Hayter will be an important stakeholder in that he will facilitate and grant me
access to server use and facilities throughout the project. I will need to present the projection and size of the
information being stored so that the necessary storage can be allocated on a secure server on his request.
5. S195215 4
Stakeholder Table
Stakeholder Relationship Participation Acceptance Criteria
Richard Pilkington Team Leader In charge of Blueprints,
authorises time schedule
Finish developing software
on time, propose project
Simon Weeks Line Manager Manages my job role and
performance review
Make sure I satisfy
quarterly goals in work
Rupert Voelcker Team manager In charge of finance and
authorisation of project
Make use of budget and
propose developed idea
Tim Game Head of Internal
Networks
Main point of contact for
customer
Achieve requirements and
ensure customers satisfied
Gary Hayter Software Facilitator Handles server hosting
for software projects
Propose feasible request for
server load and access
Figure 1, StakeholderTable
Initial Questions and Output: Scope and Feasibility
I decided to schedule meetings with the main customer (Tim Game) and a follow up discussion with team leader
(Richard Pilkington) to discuss and develop initial questions on project requirements. This was done to develop
my understanding of the requirements for the project and to ascertain the desired outcome each of the different
stakeholders require from this solution.
Internal Network Customer: Tim Game
- We will need to know when a room needs checking, how will this be achieved?
Once I have discussed with the customer how often rooms need checking, an alert system(via email or front-
end notification) can be setup for requested individuals; alerting them of room checks. This along with a visual
status change on the specific room will allow customers to search for unchecked rooms within the database.
- We only want specific people to have the ability to delete rooms, how can we setup permissions?
A separate page can be created specifically for userpermissions. Every person in the company has a unique
identifier, this can be used to log into their account with set permissions. This could be further developed
through the front end, allowing specific individuals modification abilities over other people’s permissions (read,
write, execute).
- Information on rooms are location specific and require to be linked somehow, will this be feasible?
A separate linked table can be created to allow rooms to have location identifiers within the database. This could
be developed,allowing users to view a specific location and see all rooms within that location. Specific users
can then have the ability to create, delete or edit this information.
- Navigation throughout the website is key to achieving a fast solution, how will this be optimised?
A navigation bar at the top of the page will be essentialto allow the user to switch between pages easily while
browsing the site. Pages such as ‘Rooms, Locations, Users, Home’ should be represented as buttons for the user
to efficiently switch between activities. Along with this all users will be presented with a login page at launch,
which has to be designed appropriately and fast, encouraging users to choose my solution over their old way of
working.
Team Leader: Richard Pilkington
- With the information being on our team’s software (Blueprints), how do you intend to use it?
As my solution will pull data from Blueprints, I will need to create automated import scripts to fetch this
information and upload it onto my database for the room checker. This information will need to be regularly
updated to ensure the customer (Internal Networks) has access to the newest data for locations and rooms on
their network.
- Time scale requirements are important in knowing the work load, do you know when you’ll have one?
Hopefully once the stakeholderproposal meetings have been conducted,the customer and I will begin to have a
clearer understanding ofwhat needs doing and how long the development process may take. At this point
designing and interacting closely with the customer to ensure a good understanding of the project is essentialto
progress the development of the solution.
6. S195215 5
Scope Analysis
With the size of the project I am undertaking increasing following each customer meeting, it is very beneficial
to review and discuss the intended scope for my solution.This will allow me to understand the requirements
better and encourage self-review of my time management and intended design of the solution. Deadlines are
mostly populated by stakeholder meeting for the upcoming weeks to decide a more specific approach to the
project.
Project goals
- To allowInternal Networks to access and viewall location and roomdetails
- To allowInternal Networks to check rooms and update their status accordingly
- To alertspecific Internal Network users if a room fails it’s check and change its status accordingly
- To connect rooms to their specific locationsvia a unique identifier,allowingusers to search for them
- To ensure only users with correctpermissions areableto edit and manipulatethe information.
- Make surethe login procedure to the website is fastand secure.
Functions
- A navigation bar displaying all buttons to give the user the ability to navigate the website
- A home page displaying information regardinghowto use the website and all its functionality
- A room page displayingall rooms with their correspondingdetails
- A location pagedisplayingall locations with their correspondingdetails
- A user’s page displayingall users’permissions with their correspondingdetails
- A show page displayingfurther details on each specific location or room
- Edit buttons on each room/location show page allowingmodification privileges on the information
- A logout button on the navigation bar allowingtheuser to sign out of the website.
Deadlines
- Interactingcustomer (Tim Game) stakeholder proposal –6th March 2019
- Team leader (Richard Pilkington) stakeholder proposal –8th March 2019
- Software Facilitator (Gary Hayter) stakeholder proposal –11th March 2019
- Navigation questions and output – 12th March 2019
- Design and specifications document - 15th March 2019
- Development schedule: TBD (will be discussed further in this report, see contents page 1)
Costs
- Further stakeholder meetings with Software Facilitator (Gary Hayter) and team manager (Rupert
Voelcker) required to determine cost and budgeting of overall project.Server infrastructureand
configuration design required prior to this meeting.
Possible Exclusions
Some requirements that have initially been discussed may best be left out of the development cycle of this
current project. These requirements could be picked up as additional features later in the year or may not fit the
intended purpose of the solution.
- An alertsystem that notifies all requested users whenever a room check failsexternally.
This could be a helpful feature however would require separate functionality to the initial project I set out to
create. Because this is a low priority feature this could be added in the future.
- An external portal that allows accessthrough Wi-Fi,allowinghomeuse and out of site access.
In the short term, this feature is a definite exclusion. Without a lot of time spent ensuring the design and
execution of this feature is safe and secure, this is not something to begin considering and is definitely a feature
for the future. The vast majority of the time the customer will spend accessing the site through the LAN portal,
therefore this is also considered a low priority feature.
7. S195215 6
Feasibility Analysis
With stakeholder proposals approaching I understand the need to rationalise both the functionality of my project
and the projected size of the overall software. Feasibility Analysis helps me achieve this prior to my upcoming
meetings, allowing me to reflect on the developed requirements I have so far.
Understanding the Project
The project so far consists ofa database containing information surrounding rooms within locations around the
country.The customers’ requirements are built around this data set, for example they require the ability to view
rooms, check rooms, create and delete rooms etc. This project should solely be based around appealing to this
requirement; therefore, the UI should view and manipulate rooms effectively, the database should be fast to
search and navigate, with the information being stored in sensible, consistent values.
Project Management
Along with a Development schedule soon to be decided (after stakeholder proposal) I understand the need to
organise and develop the solution in a well-structured approach.From previous experience in a development
team, the use of a kanbanboard is very beneficial to working in an agile way; a development process well suited
for this project due to the necessity for close communication with the customer. Once the customer and I have
discussed what features they would like to see first, I can visually write these into small tasks,(also known as
cards) to begin a process line that will encourage small interval progression.
Project Operation
As the lone developer of this solution, I will need to operate in a manner that will benefit both me and the
customers requirement simultaneously. I have already discussed the protentionalfor weekly Skype meetings
with a customer representative to prevent the risk of misinterpreted requirements which would waste time and
resources for both sides of the project.
Stakeholder Proposal
Overview
This software solution will allow permitted users to have individual permissions to either view or edit rooms on
a specific location. These rooms will be automatically updated from the Blueprints inventory systemwhich
contains live location/room information that is updated weekly from appropriate sources.This software solution
will be called “Room Checker” and will offer the ability to view all room information, including the check
status ofa room, “Passed,Failed, Required or Fixing”. Room checks will be scheduled on a regular basis,with
permitted users having the ability to check ‘required’ rooms. Rooms will have additional information that will
give users the ability to locate that room and send necessary people to fix the problem.
Purpose and Focus
The main purpose for this software is to allow Internal Network users to view room information easily, this will
be achievable in a central inventory that will help speed up the process of room checking and allow the users to
access consistent,up to date information.
Development for Audience
The development process will be built around the customers interaction with the software each step of the way.
This agile approach will allow small incremental changes to be reviewed and discussed with the underlying
customer, to closely relate all the development to the necessary requirements of the user.
Stakeholder Engagement
A development schedule will soon be designed after further planning of the software solution to allow
stakeholders to understand the approach needed to achieve the solution. This schedule will be accompanied by
suitable diagrams and design graphs for each important internal stakeholderto ensure they understand what I
require from them and to give them an understanding ofthe given approach. For example, a configuration
diagram will be created to outline the server interaction and safety precautions needed for using the services
under Gary Hayter.
8. S195215 7
Functional Requirements
This table outlines the functional requirements and approach to achieving the customers’ needs for this solution.
It covers what necessary criteria needs to be met along with actions to complete these tasks. Use of MOSCOW
allows me to determine the priority of the requirements along with understanding whetherthe task is achievable
within the project lifetime. Inspiration and design layout achieved came from reading ‘System Requirements
Engineering’, Loucopoulos, P. (1995)
Figure 2, Functional RequirementsTable
Non-Functional Requirements
This table outlines the non-functionalrequirements and approach to developing an optimised solution. This will
cover the security,performance and interface requirements for the customer interacting with the software
system. Inspiration and design layout achieved came from reading ‘Non-functional requirements in software
engineering’, Chung, L. et al. (2000)
Figure 3, Non-Functional RequirementsTable
(Files attached externally in submitted folder if links do not work)
- Functional Requirements Table
- Non-Functional Requirements Table
9. S195215 8
Project Risks Table
After the scope and feasibility analysis I decided to outline the possible project risks that I may encounterduring
the development of the software system.
Risk Early in the Project Late in the Project Customer
Impact
Chance of missing
deadlines
Discuss with customer the reason
for changing deadlines, agree to
new terms
Change task approach to fit in
necessary requirements for the
discussed deadlines
Medium
Requirement is
misinterpreted
Discuss with the customer the
correct requirement and
understand where it went wrong
Ensure regular meetings to lower
risk of time being wasted on the
wrong requirement
High
Requirements
change
Understand new requirements and
attempt to implement them
Analyse how this will impact the
rest of the project and discuss with
stakeholders
Medium
Budget is too low Calculate the projected budget
and discuss with the Software
Facilitator or Team Manager
Understand why this happened
and analyse the rest of the project
to prevent reoccurrence
Low
Experience lacking
for requirements
Seek help from more experienced
team members who may help
Discuss requirements with
customer to ensure they are
suitable for my skillset
Low
Figure 4, Project RisksTable
Technical Background
I have currently been in software development for around a year and a half. During this time and within my
current software team, I have spent the majority of my time writing in Ruby and using Ruby on Rails to develop
our web application. Because of my team’s software being a web application, I have past experience writing in
html, designing front end logic for customers similar to the one I have for this project.
The software my team works on is a physical inventory, and because of this I have practical experience in
manipulating and querying a database in a safe and reliable manner. Good software practices have been a big
influence in the way I develop code. I have only ever worked in an agile way and so far, has suited the solutions
I have needed to develop with a software team. Along with this I also understand the benefit of fully test-driven
development and intend to implement this style of software development into my project. From my own
experience, using VIM as an integrated development environment (IDE) will benefit me due to the familiarity of
the software and my proficiency using it. Furthermore, my development team uses mac’s and therefore I will
intend to use a mac machine to undergo this project, developing the solution on a Linux server, to ensure
compatibility when connecting via internal connections.
Lastly, I have also spent a lot of time developing software with the use of version control. Github and
supporting software such as SourceTree and CCmenu to visualise branches make development processes far
easier. When developing this software for the customer, I intend to use the same practices as Agile development
usually encourages many small tasks and changes,which can conveniently be represented as branches,
preventing any changes on master running the risk of breaking the system.
Technical Restrictions
From my first ever day being in software development, I have been in a team that had already developed a well-
functioning database solution.Because of this I have never personally had the experience to create a database
from scratch, therefore this will be completely new to me. However, I believe I have the experience and skill to
achieve this requirement, I will make sure to allow myself extra time as whilst learning there is the potential for
me to make mistakes on the way, and I do not want to miss the deadline for my customer. Secondly, I’ve never
been responsible for a project without team members to contribute with me. I will have to take on the
responsibility as the developer to interact with stakeholders and the customers it’s aimed at, as well as manage
any difficulties that will occur, something that until now I have only observed. This is an exciting opportunity
for me to put my skills to practical use but will be technically demanding. Due to my lack of experience in front
end design,I have read software books to help understand the best practices taken to achieve good front end
design,one of these books was ‘The elements of user interface design’(Theo Mandel, 1997) which emphasised
the importance of front-end testing as even things you can’t see visually wrong with the interface could still be
wrong in design.
11. S195215 10
Elicitation of requirements
These tables are the outcome of a stakeholder interaction earlier this week where we brainstormed all purposeful
interactions that could occur with the system.This was done to achieve a clearer vision of the overall system
purpose and the way data should be represented to best suit the interacting sources. Design of these tables below
was inspired by the book ‘Requirements Engineering: Fundamentals, Principles, and Techniques’, Pohl, K.
(2010)
Objects Surrounding the System
Management External Services Partners Software Developers General Users
Internal support
systems, e.g.
Finance, HR and
wellbeing
Physical locations
and rooms around
the world
Company’s whom
location and room
information is stored
Development tools,
customer support,
testing tools,
Hardware and
infrastructure
services
Web browsers, User
credentials, VPN
accessibility
Objects Produced by the System
Management External Services Partners Software Developers General Users
Export files for
reviewing and cross-
checking data for
reliability checks
External data
sources used to
import up to date
information on
locations and rooms
Ability to export file
through the system
to receive text file
information on
specific rooms
Server logging and
auditing information
based on the systems
front and back end
Customer
permissions page
with user access and
information
Objects Used by the System to Perform its functions
Management External Services Partners Software Developers General Users
Advertisement on
the systems front-
end, company
branded logo,
recognition
Export file of edited
information,
Information on
rooms requiring
service
Logging information
on their room status
Server and database
systems to present
data on the system.
Customer interaction
on the front end for
functionality, e.g
buttons and search
fields.
Figure 5, Requirements Elicitation Table
12. S195215 11
System Context Diagram
A systemcontext diagram felt necessary in order to visualise the main interactions
that take place throughout the given systemfor each external entity. This will be
used in future meetings with stakeholders in order for them to fully understand
their interactions with the systemand what services it can provide to them.
External
Services
= Input and Output
= External Entity
= Interacting System
Customers
Product
Developers
Management
Room
Checker
System
Note: Managers can also act as
customer entities, interacting with
full permissions on the system.
Note: SystemDevelopers can also
act as customer entities for testing
and user permission editing.
Figure 6, System Context Diagram
14. S195215 13
Swimlane Diagram
A Swimlane diagram helps visualise important processes within the system. This helps the customers
understand howeach main interactor contributes towards the system outcome. This is an illustration for the
process of room checking, showing how the editing of information will determine the output taken for the
system. I decided to design this swimlane diagram after understanding the importance of representing system
processes this way from the book ‘Validation of Business Process Models Using Swimlane Diagrams.’, Sauter,
V,L. Jeyaraj, A. (2014)
User Checking Room Room Checker System External Room Service
Begin Room Check
Takes user to roomcheck form
Edits room check information
Changes parsed, database queried
Room updated, status changed
External request form submitted
Changes
invalid
Status is Failed
Service individual sent to fix
room
Taken backtoRoomindex page
Status isn’t Failed
Status is Passed
Room updated, status changed
Figure 8, Swimlane Diagram
15. S195215 14
Entity Relationship Diagram
After gathering a clearer understanding ofwhat the requirements are from my main customer, I thought it would
benefit the stakeholders to visualise how the data would layout undereach resource. Below is an Entity
Relationship Diagram used to represent the data fields that each resource may hold. This helps both the user
visualise and understand the information they will be handling on the systemand helped me acknowledge the
scope and size of the data required to make this work. Below is an initial draft of what could potentially be held
within the system. Example diagrams helped me decide how best to represent my information on my system,
one example was found in this book, ‘The Entity Relationship Model – Toward a unified view of data.’, Chen,
P,P. (1976)
This diagram will be presented to the Internal Network representatives including my stakeholder Tim Game on
the 12/03/19 to discuss navigation and content questions and address what information may be required on the
final system.
Figure 9, Entity Relationship Diagram
16. S195215 15
Navigation Questions and Output
As content designs and use case tables are required soon,I thought it would be in the best interest of my two
main customers to discuss the requirements they see important for navigating the front end of the system.These
are some of the more productive navigation question and outputs gathered from the meeting.
Internal Networks Customer: Tim Game
- How will we navigate through locations and find the rooms attached to it?
The navigation bar will have a resource drop down menu allowing the userto access either locations or rooms.
After viewing the list of locations that the user has access to,they can click on a specific location which will
showall connected rooms under that location with their corresponding information.
- Managers will require the ability to export the data into a csv formatted file, how will we do this?
Managers will have permissions to request automated exports from the system,which will email out the updated
information to specific users through an export script.
- If I find a specific room that needs checking, how will I check the room?
Users that have permission to edit rooms will have a visible button “Check Room” that allows them to go
through the standard process of checking. This can then be submitted which will update the rooms in formation
and alert external services if necessary (see swimlane diagram for visual representation pg. 13).
- What process will take place in order for the internal network users to login securely?
Users will be required to enter their EIN (unique identity) code through an LDAP (Lightweight Directory
Access Protocol) secure login portal that will require the user’s internal password.Using this allows full
information on who logs into the systemand ensures all users are registered under the company’s system.
Team Leader: Richard Pilkington
- How will developers and manager permissions allow them to modify users?
Every user will have ‘view’, ‘modify’ or ‘none’ on each resource in the system. One of these resources will be
the users page.If access is given and modify permissions are enabled, that userwill have the ability to change
any users’permissions on the system. If mistakes are made, they can always be fixed back end by a developer.
To minimise this only trusted users will have this ability to change users.
- How will you develop a front end that can be navigated consistently across multiple browsers and
platforms?
The front end will probably be developed using a library such as Bootstrap that is optimised for multi-platform
web design.This is because the site requires to be accessible and functional on a range of machines used in the
workspace, therefore the navigation and button functionality will be designed and tested for this purpose.
Content Questions and Output
Internal Networks Customer: Tim Game
- How will we know what room information relates to what location?
A hierarchy containing rooms under locations will be kept in mind when developing the database tables for this
project. This will therefore link all corresponding rooms to their location, making it easy for me to display on
the front end the relationships they share. Each object in the system(room, location, user etc.) will have their
own show page, displaying all information possible.If the room is attached to a location, it will be displayed
here with a linkable trace to the location showpage.
- When we receive new location room data, how will we update the system?
Because were importing all the information from Blueprints (my teams’ software), the information will still be
required to use inside Blueprints. Then this information will automatically be pulled into the Room Checker.
- If an export is requested of the information in Room Checker, how will this be formatted?
The data will be exported into a csv file with delimiter separations for each field undera specific room or
location. This will allow quick and easy formatting of the export in software such as excel for windows or
numbers for mac which can decipher the delimiters and separate the information into its suitable headers and
rows.
17. S195215 16
Navigation Modelling
High level navigation use cases to represent the main interactors and the parts of the systemmost likely to
utilise.
Customer
Interactions with read only permissions, (and check room permissions):
Management
Interactions with all permissions across the system (Admin):
Use
Search Bar
Show Room
Page
Enter
Homepage Export file
Show Location
Page
Log
in
Change
password
Edit User
Info
Change
personal Info
Use
Search Bar
Show Room
Page
Edit User
Info
Check
Room
Enter
Homepage Export file
Change
password
Change
personal Info
Log
in
Edit
Rooms
Check
Room
Edit
Locations
Edit All
Users
Add/Remove
Rooms
Add/Remove
Locations
Show Location
Page
18. S195215 17
High-level use case: Cockburn Tables
To elaborate on the main scenario’s and functions of the system,a Cockburn use case table seemed appropriate
to give a full understanding ofwhat can take place on the website. The tables below will cover the main
interactions the systemis designed for, allowing me and the stakeholders a better understanding ofthe intended
features. I had not heard about Cockburn tables until reading one of his studies based on the template he
invented. This helped me layout the tables below; the book was called ‘Basic Use Case Template.’, Cockburn,
A. (1998)
Adding A User
Goal in Context To add a user to the system, setting their credentials, permissions and ownership
of locations
Preconditions User with the ability to view and edit users is necessary,along with a connection
via LAN or VPN.
Trigger The User decides to add a new user to the system
Scenario 1 - User navigates to the Room Checker homepage
2 - User selects ‘User’ resource from the navigation bar
3 - User selects ‘Add User’ button on the ‘Users’ show page
4 - User enters the required information about the User
5 - User selects the permissions for the User they are creating
6 - User proceeds to click ‘Submit’ button
Exceptions 1 - User presses back on their browser at any stage of the scenario
2 - User enters invalid User information
3 - User cannot be found under the LDAP server logs
4 - Customer navigates away from the User page at any point
Priority Low priority, useful but not main functionality of the system
When Available Aimed to be first release,maybe in beta version for a while as a lot of
functionality is required
Frequency of Use Credentials used very often for logins, editing user used very rarely
Channel to Actor Through a Personal Computer or mobile with LAN or VPN connectivity
Open Issues 1 - If the user enters the incorrect information, how will this be handled?
2 - If the user does not fully fill out the user, how will the system react?
3 - If the user is not found on the LDAP system, how will this be addressed?
19. S195215 18
Checking A Room
Goal in Context To select a room on the database,then proceed to check that room, changing its
status accordingly
Preconditions Appropriate user permissions should be granted, user should be logged in with
EIN credentials securely and through a LAN connection
Trigger The user decides to check a room while accessing the website
Scenario 1 - User navigates to the Room Checker homepage
2 - User selects ‘Rooms’ resource from the navigation bar
3 - User selects a specific room that requires checking
4 - User clicks the ‘Check Room’ button on the ‘Rooms’ show page
5 - User enters the required information
6 - User proceeds to click ‘Submit’
Exceptions 1 - User presses back on their browser at any stage of the scenario
2 - User enters invalid check information
3 - Customer navigates away from the check page at any point
Priority High priority, main functionality of the software solution
When Available First available release of software,fully functioning
Frequency of Use Fairly regularly, customers main feature
Channel to Actor Through a Personal Computer or mobile with LAN or VPN connectivity
Open Issues 1 - If the user enters the incorrect information, how will this be handled?
2 - If the user does not fully fill out the form, how will the system react?
20. S195215 19
Adding A Location with Rooms
Goal in Context To add a Location to the database,along with its corresponding Rooms and
information
Preconditions Appropriate user permissions should be granted, user should be logged in with
EIN credentials securely and through a LAN connection
Trigger The user decides to create a Location with Room information inside it
Scenario 1 - User navigates to the Room Checker homepage
2 - User selects ‘Locations’ resource from the navigation bar
3 - User clicks the ‘Create Location’ button on the ‘Locations’ show page
4 - User enters the required information for the Location
5 - User clicks ‘Add a Room’ button on the ‘Create Location’ page
6 - User enters the required information for the Room
7 - User proceeds to click ‘Submit’
Exceptions 1 - User presses back on their browser at any stage of the scenario
2 - User enters invalid check information
3 - Customer navigates away from the ‘Create Location’ page at any point
Priority High priority, important functionality of the software system
When Available First available release of software, most functionality should be present
Frequency of Use Very regularly, used by most managers
Channel to Actor Through a Personal Computer or mobile with LAN or VPN connectivity
Open Issues 1 - If the user enters the incorrect information, how will this be handled?
2 - If the user does not fully fill out the form, how will the system react?
Figure 10, Cockburn Use Case Tables
21. S195215 20
Requirements Conclusion
Overall, the final development design and requirements specification achieved for this software solution has
reflected the effectiveness of using design techniques as demonstrated above to work alongside the customer
and suitable stakeholders. Diagrams and visual representations ofdata in tables played an important role in the
customer understanding the systemand therefore elaborating their requirements for me to fully achieve their
desired goals in the software. Since starting this assignment, I now have a clear vision of what the customer
wants from me and how I intend to go about achieving those requirements and some of the challenges that I will
face along the way.
Not only has this document helped me and the customer understand the project, but it has also allowed me to
critically assess my own design decisions throughout this time. For example, for the configuration model (Pg.
10), I suggested a public connection to the software’s back-end system believing this would act as one of the
three approach scenarios. However, after further meetings with the customer, along with creating the non-
functional requirements I realised for security and safety reasons,it would benefit the systemmore to make the
site LAN and VPN access only. This is because the main interactions the customer has with the site will be over
a local area network, therefore risking the chance of information being leaked through a systembreach over
insecure Wi-Fi connections seemed unnecessary.
This development of the security side of the systemshows how effective critically analysing and representing
the software project in diagrams and tables is. This example and countless more have nurtured how the system
are presented as what its current form is, which is a drastic improvement in what it looked initially.
Finally, I intend to utilise this document in the upcoming months to achieve my software solution and,when
necessary,develop on the current system when obstacles occur and reflect on mistakes made. With this,I hope
to achieve an effective, and well-designed software systemto both satisfy the customer, and achieve
maintainability within the software team for future development requirements and new customers.
22. S195215 21
Bibliography
Mandel, T. (1997) The Elements of User Interface Design. 1st edition. John Wiley & Sons, Inc.
OWASP, Level 1 Application Security Verification Standards [Internet]Available at:
https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project
(Accessed:11th March 2019)
Loucopoulos,P. Karakostas, V. (1995) System Requirements Engineering.1st
edition.McGraw-Hill, Inc.
Chung, L. et al. (2000) Non-functional requirements in software engineering. 1st edition. Boston,MA : Springer.
Pohl, K. (2010) Requirements Engineering: Fundamentals,Principles,and Techniques.1st edition. Springer
Publishing Company, Inc.
Sauter, V,L. Jeyaraj, A. (2014) Validation Of Business Process Models Using Swimlane Diagrams. 1st edition.
Write State University
Chen, P,P. (1976) The Entity Relationship Model – Toward a unified view of data.1st
edition.ACM, New York.
Cockburn, A. (1998) Basic Use Case Template. 1st
edition.Independent Researcher