Dec 21, 2025
1331 Views
0 Comments
This transition from “trust but verify” to “never trust and always verify” is a completely new way of thinking about the architecture of cybersecurity. At the heart of this change is the role of the Business Analyst (BA), who, given their role, bridges the gap between busines...
This transition from “trust but verify” to “never trust and always verify” is a completely new way of thinking about the architecture of cybersecurity. At t...
“Let’s add AI” is not a requirement. It’s a vague wish that can turn into a costly prototype, a security headache, or an embarrassing production incident if...
An inflection point. A forcing function. A once-per-civilization opportunity to prove that human judgment, contextual understanding, and adaptive intelligence remain indispensable ...

More Articles

21737 Views
27 Likes
0 Comments
Process modeling/mapping/flowing, can be an art, and science, based on the maturity of the organization, knowledge of those doing this work in the organization, and many other factors. What I have found can be challenging is identifying the actual processes to model/map/flow. The fight identification may not occur on the first attempt as this work can be quite iterative, however, there are some concepts that can help make the identification a little easier
33177 Views
38 Likes
3 Comments

Project Scope. We will see how scope statements, when making reference to business functionality, lead directly to High-Level requirements.  Gathering requirements for a business information system is most often done within the context of a project. Approval of a project includes its sponsors signing off on its scope. The scope for a business information system project is typically defined in functional terms. Items in scope make reference to (or should make reference to) business functions, processes and/or activities that are to be delivered.

47100 Views
42 Likes
0 Comments

Capability-based planning is a growing practice in the field of enterprise architecture. Its success is due to the fact that it provides actual value to practitioners and the organizations that employs them. Indeed, capability-based planning helps in a number of ways, from providing a clear understanding of existing capabilities to promoting effective Business-IT alignment. Considering these benefits, we thought it useful to address this practice and bring some clarity to the subject for the benefit of all who might not yet have a good handle on the topic.

23063 Views
40 Likes
0 Comments
Becoming a Certified Business Analysis Professional (CBAP) has been one of the most rewarding and challenging endeavors for me as a business analyst. The purpose of this article is to help other business analysts pass the CBAP exam on the first try by sharing the strategy that I used. Hopefully, it will be of great service to many business analysts and aspiring CBAPs. Below is an outline to navigate you through studying for the CBAP and absorbing the BABOK material.
20434 Views
30 Likes
1 Comments
In recent years, agile software development has been the classic example of this pursuit of magic solutions, so I’ll use that as an example here. Over the years, though, people have leapt onto the bandwagons of numerous new software approaches. They all have merits, they all have limitations, and they all need to be applied to appropriate problems.
Page 73 of 100First   Previous   68  69  70  71  72  [73]  74  75  76  77  Next   Last   

Templates & Aides

Templates & AidesTemplates & Aides: find and share business analysis templates as well as other useful aides (cheat sheets, posters, reference guides) in our Templates & Aides repository.  Here are some examples:
* Requirements Template
* Use Case Template
* BPMN Cheat Sheet

Community Blog - Latest Posts

One of the most underrated skills for a business or system analyst in integration projects is knowing when to recommend a message queue — tools like RabbitMQ, Kafka, or Azure Service Bus. Let’s be honest: not every integration needs one. But when it does, queues can save your system from chaos. What Queues Actually Solve Messag...
When building integrations between systems, one of the first architectural choices you’ll face is how to align data between them. Two main approaches dominate this conversation: direct field mapping and the canonical data model. Let’s break them down. Field Mapping: Simple but Fragile Field mapping means you connect each field f...
System Analysts who work with integration processes should formulate user stories in a way that diverges from the traditional structure. This is primarily due to the need for a more technical and structured description, which allows for the inclusion of integration-specific details. The user story might need to specify exactly what kind of data ...

 



Upcoming Live Webinars

 




Copyright 2006-2025 by Modern Analyst Media LLC