Forums for the Business Analyst

 
  Modern Analyst Forums  Business and Sy...  RequirementsShow No Replies
 Threads
RepliesViews
 Last Post
Hot Thread with new postsExplaining your job to your mother
 by Craig Brown
No Rating
112331
6/23/2011 7:28 AM
by David Wright
Hot Thread with new postsWhat is meant by "software systems integrity" when defining non-functional requirements?
 by johnjohn123
No Rating
323622
5/2/2011 6:12 PM
by KJ
Hot Thread with new postsOrganizing requirements written in Microsoft Word
 by Gexian
No RatingUnresolved
210335
4/28/2011 10:40 PM
by Craig Brown
Hot Thread with new postsReq Identification Methodologies and CASE tools
 by Evrim Agha
No RatingUnresolved
110925
4/28/2011 10:28 PM
by Craig Brown
Hot Thread with new postsRequirement - Responsible entity
 by Keondo
No Rating
18994
4/28/2011 10:13 PM
by Craig Brown
Hot Thread with new postsCan a BRD just have only use cases
 by sraaj
No Rating
113847
4/28/2011 9:50 PM
by Craig Brown
Hot Thread with new poststhe level of details when writting a use case document (Page: 1, 2)
 by johnjohn123
No Rating
618720
4/28/2011 10:30 AM
by spoonertech
Hot Thread with new postsUse case diagram- can i connect two actors to the same use case? (Page: 1, 2)
 by johnjohn123
No Rating
532611
4/28/2011 5:48 AM
by Gor
Hot Thread with new postsRelation between "First time Register" & "login" use cases
 by johnjohn123
No Rating
39908
4/28/2011 1:00 AM
by Kimbo
Hot Thread with new postsCan i indicates that "regester new user" use case extends "Login" use case
 by johnjohn123
No Rating
19088
4/24/2011 5:48 AM
by KJ
Hot Thread with new postsWeb Site Requirements
 by kathysask
No RatingUnresolved
39739
4/20/2011 2:11 AM
by Kimbo
Hot Thread with new postsDifference between Non Functional and Process Requirements
 by Kashif
No RatingUnresolved
110234
4/19/2011 7:22 PM
by KJ
Hot Thread with new postsRequirement Context Question
 by Irene
No Rating
28754
4/17/2011 5:31 PM
by KJ
Hot Thread with new postsManaging Requirement Conflict During a JAD Workshop (Page: 1, 2)
 by GBusiness
No RatingResolved
625899
3/27/2011 9:50 PM
by Riz
Hot Thread with new postsA productivity tool for analysts
 by Avi
No Rating
09970
3/25/2011 11:06 PM
by Avi
Hot Thread with new postsFrom Business Use Cases To System Use Cases
 by Evrim Agha
No RatingUnresolved
010088
3/24/2011 7:42 PM
by Evrim Agha
Hot Thread with new postsSpecfying Business Requirements: What techniques have people used to model data and field busines ru
 by chanos
No Rating
19133
3/3/2011 1:18 AM
by Kimbo
Hot Thread with new postsGathering and documentation of out of the box requirements
 by piya
No Rating
110491
3/2/2011 5:39 PM
by KJ
Hot Thread with new postsDatabase Archiecure Requirements
 by j2j
No RatingUnresolved
39437
3/1/2011 11:47 PM
by Kimbo
Hot Thread with new postsRequirements Questions
 by C.Yudhatama
No RatingUnresolved
18712
2/28/2011 7:08 AM
by j2j
  Modern Analyst Forums  Business and Sy...  Requirements
Display threads from:

Community Blog - Latest Posts

Leveraging Blockchain Technology for Enhanced Data Security in Business Operations
In an age where data breaches and cyberattacks are becoming more frequent and sophisticated, businesses are searching for robust solutions to safeguard their data. Blockchain technology has emerged as a promising tool in this quest, offering a way to secure data with unparalleled reliability. Although initially known for powering cryptocurrencies l...
Building software products that solve actual customer concerns and generate business success is not an easy fit. Product executives battle strong competition, tight timelines, and high expectations, all while seeking to offer value. While success gives the opportunity to showcase approaches and frameworks, the reality is that building excellent pro...
Business Impact Analysis(BIA): Assessing the Potential Impact of a Cybersecurity Incident on Business Operations
In today’s highly interconnected society, businesses depend on technology even more than before. While offering opportunities for innovation and creativity, businesses are exposed to various cybersecurity threats that can disrupt operations, damage reputation, and result in substantial financial losses. It is crucial to carry out a comprehens...

 



Upcoming Live Webinars




 

Copyright 2006-2025 by Modern Analyst Media LLC