The document outlines the key steps for deploying a Dynamics AX project, including diagnostic, design, development, deployment, and operation phases. The deployment phase focuses on end user training, change management considerations, final data migration, system testing, user acceptance testing, cutover to production plan, and post production support plan. The operation phase includes providing post go-live support, transitioning to support, formal project closure with lessons learned, and system acceptance sign off.
This presentation offers one perspective on how Lean Six Sigma, CMMI, and other best practice models and standards can be combined to leverage the best features of each. Lean Six Sigma and CMMI differences and similarities are examined, including how they typically differ in terms of deployment, investment, and ROI.
A "low-calorie" approach to LSS deployment is described. The role of LSS in relation to CMMI specific and generic goals is examined. Direct and indirect connections between LSS and CMMI are examined in the context of specific Process Areas in order to clarify when and how they are likely to interact and which may be regarded as 'first'.
Maturing Project Management with the Use of a Methodology Member Content
- by Atul Ganatra, PMP
Recognizing the need for and benefits of a tailored methodology helps an organization instill discipline and consistency in the ways in which project managers manage change delivery. This article explains the benefits of implementing a customized methodology, the factors that affect the ways in which it undertakes these changes, components of a project management methodology, the stages of its implementation, and a few points for avoiding pitfalls.
Integrated methodology for testing and quality management.Mindtree Ltd.
MindtestTM is an integrated testing methodology that meshes all the components of a testing engagement, manages the quality of testing, and delivers measurable and predictable software quality.
More Information:
https://flevy.com/browse/business-document/pdca-problem-solving-technique-and-tools-151
BENEFITS OF DOCUMENT
Learn how to apply the PDCA approach to solve problems and save money.
Learn how to apply the basic quality tools to identify and analyse problems.
Learn how to develop problem solving teams to sustain a continuous improvement culture.
DOCUMENT DESCRIPTION
In this training presentation, you will be able to teach employees on the structured Plan-Do-Check-Act (PDCA) approach to problem solving. Many world class companies such as Toyota uses the PDCA problem solving process for the relentless pursuit of continuous improvement. When combined with the basic quality tools, this approach identifies problems, analyzes root causes and generates solutions. Teach your staff to put effective solutions in place to prevent similar problems from recurring in the future. This methodology can be applied to both manufacturing and service organizations.
LEARNING OBJECTIVES:
1. Understand the principles and key concepts of problem solving
2. Learn how to apply the PDCA technique and basic quality tools to problem solving
3. Learn how to identify root causes and develop countermeasures
4. Learn how to prepare a problem solving storyboard
5. Understand the roles of problem solving team
6. Define the critical success factors for effective problem solving
CONTENTS:
1. Introduction to Problem Solving
2. Concept of Problem Solving Teams
3. Overview of Process Management
4. PDCA Problem Solving - The Step-by-step Approach
5. Basic Problem Solving Tools
6. Project Reporting Using A3 Storyboard
7. 10 Common Mistakes
8. Critical Success Factors
This training presentation can be used together with the 'PDCA Problem Solving Template' (sold separately).
This is the main presentation for the MBA course I teach on Project Quality Management. It is based on a combination of the Critical Chain Approach by Dr Goldratt, the PMBOK (chapter 8) plus my own experience as Sr Validation Project Manager, Lawyer & US ARMY Officer
This presentation offers one perspective on how Lean Six Sigma, CMMI, and other best practice models and standards can be combined to leverage the best features of each. Lean Six Sigma and CMMI differences and similarities are examined, including how they typically differ in terms of deployment, investment, and ROI.
A "low-calorie" approach to LSS deployment is described. The role of LSS in relation to CMMI specific and generic goals is examined. Direct and indirect connections between LSS and CMMI are examined in the context of specific Process Areas in order to clarify when and how they are likely to interact and which may be regarded as 'first'.
Maturing Project Management with the Use of a Methodology Member Content
- by Atul Ganatra, PMP
Recognizing the need for and benefits of a tailored methodology helps an organization instill discipline and consistency in the ways in which project managers manage change delivery. This article explains the benefits of implementing a customized methodology, the factors that affect the ways in which it undertakes these changes, components of a project management methodology, the stages of its implementation, and a few points for avoiding pitfalls.
Integrated methodology for testing and quality management.Mindtree Ltd.
MindtestTM is an integrated testing methodology that meshes all the components of a testing engagement, manages the quality of testing, and delivers measurable and predictable software quality.
More Information:
https://flevy.com/browse/business-document/pdca-problem-solving-technique-and-tools-151
BENEFITS OF DOCUMENT
Learn how to apply the PDCA approach to solve problems and save money.
Learn how to apply the basic quality tools to identify and analyse problems.
Learn how to develop problem solving teams to sustain a continuous improvement culture.
DOCUMENT DESCRIPTION
In this training presentation, you will be able to teach employees on the structured Plan-Do-Check-Act (PDCA) approach to problem solving. Many world class companies such as Toyota uses the PDCA problem solving process for the relentless pursuit of continuous improvement. When combined with the basic quality tools, this approach identifies problems, analyzes root causes and generates solutions. Teach your staff to put effective solutions in place to prevent similar problems from recurring in the future. This methodology can be applied to both manufacturing and service organizations.
LEARNING OBJECTIVES:
1. Understand the principles and key concepts of problem solving
2. Learn how to apply the PDCA technique and basic quality tools to problem solving
3. Learn how to identify root causes and develop countermeasures
4. Learn how to prepare a problem solving storyboard
5. Understand the roles of problem solving team
6. Define the critical success factors for effective problem solving
CONTENTS:
1. Introduction to Problem Solving
2. Concept of Problem Solving Teams
3. Overview of Process Management
4. PDCA Problem Solving - The Step-by-step Approach
5. Basic Problem Solving Tools
6. Project Reporting Using A3 Storyboard
7. 10 Common Mistakes
8. Critical Success Factors
This training presentation can be used together with the 'PDCA Problem Solving Template' (sold separately).
This is the main presentation for the MBA course I teach on Project Quality Management. It is based on a combination of the Critical Chain Approach by Dr Goldratt, the PMBOK (chapter 8) plus my own experience as Sr Validation Project Manager, Lawyer & US ARMY Officer
Do You Need A Release Manager For Your SDLC Workflow?Enov8
Release management is the long-term process that includes strategic planning of software releases, designing them efficiently, controlling the software build, testing, and deploying them. The involved teams need to monitor the entire process, ensuring that the applications and upgrades are delivered. Also, an integrated production environment is maintained.
Java programming presentations By Daroko blog
Do not just read java as a programmer, find projects and start making some Money, at DAROKO BLOG,WE Guide you through what you have learned in the classroom to a real business Environment, find java applications to a real business Environment, find also all IT Solutions and How you can apply them, find the best companies where you can get the IT jobs worldwide, Find java contract, Complete and start making some cash, find clients within your Country, refer and get paid when you complete the work.
Not Just a contact, at daroko Blog (www.professionalbloggertricks.com/),you are also being taught how you can apply all IT related field in real world.
Simply Google, Daroko Blog or visit (www.professionalbloggertricks.com/) to Know More about all these service now.
Do not just learn and go, apply them in real world.
A Complete Guide To Software Release Planning New.pdfNoman Shaikh
Software development has transformed drastically in past years. Release management is one of the most advanced solutions to distinctive challenges that are faced by project managers and software engineers. With a growing number of businesses and organizations becoming digital, there has been a huge demand for new and exclusive software and web applications.
“Selecting and implementing a new asset finance system? In the second of three articles, we go back to basics to take a look at what you need to consider at the start of your project to give yourself the best chance of success.”
This has necessarily been a brief look at Project Initiation. We welcome comments and would be happy to help you get your project off to a good start.
The DevOps promise: IT delivery that’s hot-off-the-catwalk and made-to-lastPeter Shirley-Quirk
DevOps promises rapid delivery AND stable operations by integrating business, development, test, deployment and operations into a cohesive workflow with a rapid feedback cycle. So how is that possible?
Asset finance system project initiation 101. “Selecting and implementing a new asset finance system? In the second of three articles, we go back to basics to take a look at what you need to consider at the start of your project to give yourself the best chance of success.” This has necessarily been a brief look at Project Initiation. We welcome comments and would be happy to help you get your project off to a good start.
Information System Acquisition & Lifecycle: system acquisition process, phases: Initiation, Planning, Procurement, System Development, System Implementation, Maintenance & Operations, and Closeout. development models.
Online auction system is web based application, in which the seller can sell the goods by sitting in his own house ,so the main advantage of this application is that there is no more system compatibility requirement problem. The main advantage of the online auction system is that the user can have the better choices for their investment and also it is time saving , and through this system user can invest in their own selected firm.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Some steps and rules to deploy dynamics ax
1. Some steps and rules to
deploy aDynamics AX project
How to succeed !
Slides written by Guy de Lussigny
2. Diagnostic: this phase captures scope and commences at the earliest
possible stage, usually pre-award of a contract
Steps to
deploy it
Implementations have many similarities
across these products, Sure Step has been
structured as a general methodology with a
product-specific layer for each product. The
general content consists primarily of
prescriptive phase-by-phase and activity-by-
activity descriptions for completing an
implementation, and also includes
information on the Project Management
discipline.
Design: this phase embarks upon a technical design for the solution build,
to define:Entities, forms, processes, workflows, roles & permissions,
reports, data migration, and integration touch points.Custom feature
designs (these are identified through the Sure Step Fit Gap process)
Development: if design is sufficiently detailed a traditional waterfall
process would follow: An alternative would be to consider an agile
approach (this adds value when requirements are not fully appreciated
and further exploration / visualisation is needed) . Tollgate reviews
involving project team members provide quality and momentum
assurance
Deployment: deployment planning prepares for go live, and covers
elements such as: End User Training, Train the Trainer, Operational
Guides, Change Management Considerations, Final Data Migration,
System Testing (Processes, Integration, Data Acceptance, etc.), User
Acceptance Testing, Cutover to Production Plan, Post Production Support
Plan
Operation: on release to live the project team would normally provide
Post Go Live support and resolve, questions, issues, or skills transfer
requirements. Thereafter there would be a: Transition to Support,
Formal Project Closure Complete (includes lessons learnt), System
Acceptance and Sign Off
Slides by Guy de Lussigny
3. A Few Steps for a successful project
%
%
%
%
%
Deployment: deployment planning prepares for go
live, and covers elements such as:
- - End User Training, Train the Trainer,
Operational Guides,
- - Change Management Considerations,
- - Final Data Migration
- - System Testing (Processes, Integration, Data
Acceptance, etc.)
- - User Acceptance Testing
- - Cutover to Production Plan
- - Post Production Support Plan
Slides by Guy de Lussigny
4. Setting training goals. The first objective in providing software
training for end-users is minimizing any productivity losses
associated with the software transition. This means to have
to, as quickly as possible, get them up to the skill level
required to do their jobs at least as quickly and accurately as
they were doing with the old software
End User
Training,
Train the
Trainer,
Operational
Guides
Assessing end-user needs An important element in creating the
training plan is to evaluate the technical skill level(s) of those
who will actually use the software on a daily basis.
Training delivery methods * Individual hands-on instructor *
Hands-on classroom style instructor-led training * Seminar
style group demonstration * Computer Based Training (CBT) *
Book-based self-paced training
Creating a training program End-user training is more effective
and memorable if you tailor it to your own organization's use
of the software, rather than generic lessons.
Making thetraining program scalable A scalable training
program is flexible enough to accommodate both small
numbers of users (for example, when new employees join the
company and need to be trained on the software) and large
numbers (as is necessary in an organization-wide rollout of a
new product)
Slides by Guy de Lussigny
5. 1. Have a clear vision: Executive leadership must communicate a clear picture of where the organization is today, what
success looks like in the future, and the organizational culture required to achieve it. This must be done consistently
throughout the strategic planning process, using multiple communication channels.
2. Influence the right people at the right times: People accept personal responsibility for change at a different pace. Identify
early adopters, or those that carry greater influence over staff first. Get their support for cultural change and their
commitment toward being a catalyst. This is best accomplished during 1:1 discussion between executive leadership and key
staff.
3. Leverage what’s already working: Identify current initiatives, actions, or processes that reinforce the behaviors of the ideal
organizational culture. Identify areas of success to further strengthen as strategic opportunities during a SWOT exercise.
Think practical and pragmatic, not always big picture. What are the little things that are working that can be easily
replicated across the organization?
4. Invoke the heart: Don’t just let people be aware of change. Make them feel it. Speak to the emotional impact that positive
change will have on individuals and the team dynamic. Communicate how organizational change improves the quality of an
individual’s work experience. This should start during pre-planning, staff-wide communications, staff meetings, and all-staff
town hall meetings.
5. Demystify the elephant: The big, bad and scary doesn’t have to be overwhelming. Break it into smaller, more palatable,
bite-sized pieces. Change the individual pieces, not the entirety all at once. These components of the bigger challenge, or
opportunity may become your organization’s Strategic Priorities during the Strategic Planning Process.
6. Personalize it: Personalize the impact of a cultural shift staff-wide during communications. Answer the question, "what’s in
it for me?" How an organization answers this question needs to be incorporated into communication channels supporting
the Strategic Planning Process.
7. Let people see it: Help leadership, including senior management, visualize the change. Use pictures. Use analogies. Use
comparisons. People believe things they can see. When management sees the picture, they can help tell the visual story.
8. Magnify small wins: Do something about the small things that have the biggest impact first. Highlight areas where cross-
divisional collaboration and coordination has already taken place.
9. Tell the story: An audience loves a good story. Share it often, from different perspectives, including those from a divisional
perspective. How is the strategic planning process positively impacting the division? What’s changing? What’s changing as a
result of the strategy’s execution?
Change
Management
Considerations
Slides by Guy de Lussigny
6. In system testing the behavior of whole
system/product is tested as defined by the
scope of the development project or product.
Final Data
Migration &
System
Testing
System testing should investigate both
functional and non-functional requirements
of the testing.
System testing is carried out by specialists
testers or independent testers.
System testing is most often the final test to
verify that the system to be delivered meets
the specification and its purpose.
It may include tests based on risks and/or
requirement specifications, business process,
use cases, or other high level descriptions of
system behavior, interactions with the
operating systems, and system resources.
Slides by Guy de Lussigny
7. Testing is a set of activities conducted to facilitate discovery and/or evaluation of properties of one or more
items under test.[3] Each individual test, known as a test case, exercises a set of predefined test activities,
developed to drive the execution of the test item to meet test objectives; including correct implementation,
error identification, quality verification and other valued detail.[3] The test environment is usually designed
to be identical, or as close as possible, to the anticipated production environment. It includes all facilities,
hardware, software, firmware, procedures and/or documentation intended for or used to perform the
testing of software.
UAT and OAT test cases are ideally derived in collaboration with business customers, business analysts,
testers, and developers. It's essential that these tests include both business logic tests as well as operational
environment conditions. The business customers (product owners) are the primary stakeholders of these
tests. As the test conditions successfully achieve their acceptance criteria, the stakeholders are reassured the
development is progressing in the right direction.
- User acceptance test (UAT) criteria (in agile software development) are usually created by business
customers and expressed in a business domain language. These are high-level tests to verify the
completeness of a user story or stories 'played' during any sprint/iteration.
- Operational acceptance test (OAT) criteria (regardless if using agile, iterative or sequential development)
are defined in terms of functional and non-functional requirements; covering key quality attributes of
functional stability, portability and reliability.
- User
Acceptance
Testing
- Cutover to
Production Plan
- Post Production
Support Plan
Slides by Guy de Lussigny
8. In system testing the behavior of whole
system/product is tested as defined by the
scope of the development project or product.
Cutover to
Production
Plan & Post
Production
Support
Plan
System testing should investigate both
functional and non-functional requirements
of the testing.
System testing is carried out by specialists
testers or independent testers.
System testing is most often the final test to
verify that the system to be delivered meets
the specification and its purpose.
It may include tests based on risks and/or
requirement specifications, business process,
use cases, or other high level descriptions of
system behavior, interactions with the
operating systems, and system resources.
Slides by Guy de Lussigny