Forums for the Business Analyst

 
  Modern Analyst Forums  Business and Sy...  RequirementsShow No Replies
 Threads
RepliesViews
 Last Post
Hot Thread with new postsExplaining your job to your mother
 by Craig Brown
No Rating
112063
6/23/2011 8:28 AM
by David Wright
Hot Thread with new postsWhat is meant by "software systems integrity" when defining non-functional requirements?
 by johnjohn123
No Rating
323409
5/2/2011 7:12 PM
by KJ
Hot Thread with new postsOrganizing requirements written in Microsoft Word
 by Gexian
No RatingUnresolved
210157
4/28/2011 11:40 PM
by Craig Brown
Hot Thread with new postsReq Identification Methodologies and CASE tools
 by Evrim Agha
No RatingUnresolved
110740
4/28/2011 11:28 PM
by Craig Brown
Hot Thread with new postsRequirement - Responsible entity
 by Keondo
No Rating
18813
4/28/2011 11:13 PM
by Craig Brown
Hot Thread with new postsCan a BRD just have only use cases
 by sraaj
No Rating
113661
4/28/2011 10:50 PM
by Craig Brown
Hot Thread with new poststhe level of details when writting a use case document (Page: 1, 2)
 by johnjohn123
No Rating
618367
4/28/2011 11:30 AM
by spoonertech
Hot Thread with new postsUse case diagram- can i connect two actors to the same use case? (Page: 1, 2)
 by johnjohn123
No Rating
532109
4/28/2011 6:48 AM
by Gor
Hot Thread with new postsRelation between "First time Register" & "login" use cases
 by johnjohn123
No Rating
39733
4/28/2011 2:00 AM
by Kimbo
Hot Thread with new postsCan i indicates that "regester new user" use case extends "Login" use case
 by johnjohn123
No Rating
18923
4/24/2011 6:48 AM
by KJ
Hot Thread with new postsWeb Site Requirements
 by kathysask
No RatingUnresolved
39575
4/20/2011 3:11 AM
by Kimbo
Hot Thread with new postsDifference between Non Functional and Process Requirements
 by Kashif
No RatingUnresolved
110065
4/19/2011 8:22 PM
by KJ
Hot Thread with new postsRequirement Context Question
 by Irene
No Rating
28597
4/17/2011 6:31 PM
by KJ
Hot Thread with new postsManaging Requirement Conflict During a JAD Workshop (Page: 1, 2)
 by GBusiness
No RatingResolved
625540
3/27/2011 10:50 PM
by Riz
Hot Thread with new postsA productivity tool for analysts
 by Avi
No Rating
09800
3/26/2011 12:06 AM
by Avi
Hot Thread with new postsFrom Business Use Cases To System Use Cases
 by Evrim Agha
No RatingUnresolved
09905
3/24/2011 8:42 PM
by Evrim Agha
Hot Thread with new postsSpecfying Business Requirements: What techniques have people used to model data and field busines ru
 by chanos
No Rating
18963
3/3/2011 2:18 AM
by Kimbo
Hot Thread with new postsGathering and documentation of out of the box requirements
 by piya
No Rating
110304
3/2/2011 6:39 PM
by KJ
Hot Thread with new postsDatabase Archiecure Requirements
 by j2j
No RatingUnresolved
39266
3/2/2011 12:47 AM
by Kimbo
Hot Thread with new postsRequirements Questions
 by C.Yudhatama
No RatingUnresolved
18531
2/28/2011 8:08 AM
by j2j
  Modern Analyst Forums  Business and Sy...  Requirements
Display threads from:

Community Blog - Latest Posts

Leveraging Blockchain Technology for Enhanced Data Security in Business Operations
In an age where data breaches and cyberattacks are becoming more frequent and sophisticated, businesses are searching for robust solutions to safeguard their data. Blockchain technology has emerged as a promising tool in this quest, offering a way to secure data with unparalleled reliability. Although initially known for powering cryptocurrencies l...
Building software products that solve actual customer concerns and generate business success is not an easy fit. Product executives battle strong competition, tight timelines, and high expectations, all while seeking to offer value. While success gives the opportunity to showcase approaches and frameworks, the reality is that building excellent pro...
Business Impact Analysis(BIA): Assessing the Potential Impact of a Cybersecurity Incident on Business Operations
In today’s highly interconnected society, businesses depend on technology even more than before. While offering opportunities for innovation and creativity, businesses are exposed to various cybersecurity threats that can disrupt operations, damage reputation, and result in substantial financial losses. It is crucial to carry out a comprehens...

 



Upcoming Live Webinars




 

Copyright 2006-2025 by Modern Analyst Media LLC