17611 Views
27 Likes
0 Comments
Process modeling/mapping/flowing, can be an art, and science, based on the maturity of the organization, knowledge of those doing this work in the organization, and many other factors. What I have found can be challenging is identifying the actual processes to model/map/flow. The fight identification may not occur on the first attempt as this work can be quite iterative, however, there are some concepts that can help make the identification a little easier
24992 Views
38 Likes
3 Comments

Project Scope. We will see how scope statements, when making reference to business functionality, lead directly to High-Level requirements.  Gathering requirements for a business information system is most often done within the context of a project. Approval of a project includes its sponsors signing off on its scope. The scope for a business information system project is typically defined in functional terms. Items in scope make reference to (or should make reference to) business functions, processes and/or activities that are to be delivered.

34590 Views
42 Likes
0 Comments

Capability-based planning is a growing practice in the field of enterprise architecture. Its success is due to the fact that it provides actual value to practitioners and the organizations that employs them. Indeed, capability-based planning helps in a number of ways, from providing a clear understanding of existing capabilities to promoting effective Business-IT alignment. Considering these benefits, we thought it useful to address this practice and bring some clarity to the subject for the benefit of all who might not yet have a good handle on the topic.

18485 Views
40 Likes
0 Comments
Becoming a Certified Business Analysis Professional (CBAP) has been one of the most rewarding and challenging endeavors for me as a business analyst. The purpose of this article is to help other business analysts pass the CBAP exam on the first try by sharing the strategy that I used. Hopefully, it will be of great service to many business analysts and aspiring CBAPs. Below is an outline to navigate you through studying for the CBAP and absorbing the BABOK material.
14845 Views
30 Likes
1 Comments
In recent years, agile software development has been the classic example of this pursuit of magic solutions, so I’ll use that as an example here. Over the years, though, people have leapt onto the bandwagons of numerous new software approaches. They all have merits, they all have limitations, and they all need to be applied to appropriate problems.
14963 Views
23 Likes
1 Comments

Our job is to be trusted advisors and one area where we can establish trust is to help our stakeholders understand language that might be confusing to them. In order words, we can establish trust by translating technical complexity into business language. We BAs have always done this. We take customer requirements and translate them into something the technical folks can understand…and vice versa.  But what about translating in the digital world? We still need to translate, but it’s different. It’s more complex. 

17290 Views
26 Likes
2 Comments

We live in a time when business in many industries offer similar products and use comparable technologies. One of the last points of differentiation are processes, and the evidence is clear, in sector after sector: companies that figure out how to combine business domain expertise with advanced analytics to improve their internal and customer-facing processes are winning the market.  Let’s take a look at three of the many opportunities that the advanced analytics technologies developed over the past decade are creating for business analysts..

23210 Views
19 Likes
0 Comments

DevOps is based on a culture of trusted partners. This partnership is between software development, quality assurance, security and controls, and operations. The result is a smooth and fast transition of software from development to operations. However, like Dover, if the trusted partners are somehow reorganized into formal handoffs each with their own software acceptance procedures, the movement of software is no longer smooth nor fast.

20312 Views
33 Likes
1 Comments

One of the three activities encompassed under Requirements Analysis is the process of ‘ Requirements elicitation’. IIBA’s definition of ‘elicitation’ is “An activity within requirements development that identifies sources for requirements and then uses elicitation techniques to gather requirements from those sources.

However, this definition appears incomplete from an analyst’s point of view as it relies solely on the assumption that one can come up with requirements only by running elicitation techniques; however, the process of elicitation is not as simple and straightforward as it seems. Let’s see why.

15585 Views
19 Likes
0 Comments

This article describes the process of the strategic enterprise analysis utilizing text and tables. In the past 5 years, things have changed, and I have gained new insight and most important learned new aspects. As a result, this article expands previous material to include...

33439 Views
32 Likes
0 Comments

In this article, I want to share my knowledge on how to manage product backlog using Jira. The article will be useful not only to business analysts or product owners but also to scrum masters, project managers. Basically, anyone who works with backlog and requirements on a project will benefit from reading it. There are certain rules and approaches that you have to follow to achieve good results.

Before we take a look at it I want to point out that this approach is not a market standard yet. However, over the last 3 years, I’ve completed a good number of projects using the approach I’ll be describing here

On the image below I tried to emphasize the main activities and processes that should be presented in your project. You also have to keep in mind that each artifact and process has own goal and definition.

34806 Views
31 Likes
0 Comments

Personally, I believe the best approach to enterprise risk and security management (ERSM) is to rely on several open standards, most notably the ArchiMate standard for enterprise architecture modeling, as well as the Open FAIR standard for information risk management. More details are described in The Open Group’s white paper on modeling enterprise risk management and security.
96433 Views
46 Likes
0 Comments

The function of a technical business analyst is to bridge between business and technical teams. This can be undertaken in various forms. First, the bridging can be done by translating business requirements into technical artifacts. The analyst must be able to assess the business and note the basic requirements of that particular business at that given time. Using their skilled knowledge in technology they must be able to translate the given come up requirements into technological terms. The requirements must, therefore, be taken care of technologically for efficiency and accuracy.

34938 Views
27 Likes
1 Comments

While many business analysts may be able to get by without ever writing a single line of code, the ability to write and interpret SQL queries can greatly increase your effectiveness as a BA. The purpose of this article is not to provide a tutorial on learning SQL, however, it is to demonstrate how SQL can be used in various business analysis techniques without having to rely on more technical roles such as data analysts or developers (they have plenty of other things to do).

12826 Views
15 Likes
0 Comments

No matter what type of project you’re working on, how big your team is, or what your specific processes are like, you can apply these 5 steps to help you manage the day-to-day events that get you to the finish line. They help you cover the bases by assessing the project status, planning proactively, reacting appropriately, connecting your work with others, and following up with the team and clients.

Page 19 of 83First   Previous   14  15  16  17  18  [19]  20  21  22  23  Next   Last   

 



Upcoming Live Webinars

 




Copyright 2006-2024 by Modern Analyst Media LLC