Business Analysis Articles

Dec 07, 2025
412 Views
0 Comments
An inflection point. A forcing function. A once-per-civilization opportunity to prove that human judgment, contextual understanding, and adaptive intelligence remain indispensable even as artificial intelligence transforms everything around us. You're not preparing for 2027. You're def...
An inflection point. A forcing function. A once-per-civilization opportunity to prove that human judgment, contextual understanding, and adaptive intelligence remain indispensable ...
This article describes using a Requirements-Friendly Data Dictionary (RFDD) as an alternative to representing a software solution’s data-related requirements as User Stories,...
For business analysts, those unsung heroes who sift through mountains of information to guide corporate decisions, data privacy emerges as an unexpected ally. It's the secret w...

Latest Articles

21440 Views
3 Likes
1 Comments

There is no single correct way to document specific requirements information. Every BA needs a rich tool kit of techniques at her disposal so that she can choose the most effective requirements view in each situation. In this article I offer some ideas about how to make that choice.

22847 Views
3 Likes
1 Comments

Of the four articles in the series, this particular article is the most sensitive. If not practiced with caution, trying to influence someone or a situation could have a devastating impact. Therefore, this article comes with a disclaimer: “Stupid is as stupid does.”
 

31584 Views
14 Likes
1 Comments

The purpose of this article is to provide project managers and business analysts an example of choosing a hybrid solution development life cycle (i.e., combination of agile and waterfall). Much discussion has transpired on the virtues of agile and waterfall approaches.  

28068 Views
7 Likes
1 Comments

At some time or another, most companies will likely experience a point in their development when business process management (BPM) will need to be adjusted in order to support growth, mitigate a challenge or respond to market trends. Exploring how multinational corporations such as Apple and Hewlett-Packard have handled such challenges can offer insight for managers looking to apply best practices to the unique situations facing their own organizations.

 

20853 Views
16 Likes
0 Comments

As we travelled around India we were initially amazed at how the traffic flowed. India is a populous country, of course, and they have an ever-increasing number of vehicles.  No matter what time of day it was, the traffic seemed heavy. So, how can their constant flow of traffic work?
 

13793 Views
5 Likes
1 Comments

Teams that are geographically distributed and primarily work virtually face many challenges. One of them is sharing knowledge. I am part of an organization which has a team in Denmark responsible for development of the platform we support, while a team in India is responsible for the maintenance.

82203 Views
20 Likes
1 Comments

Enterprise analysis (also known as strategic enterprise analysis or company analysis) is defined as focusing “on understanding the needs of the business as a whole, its strategic direction, and identifying initiatives that will allow a business to meet those strategic goals.” 

23928 Views
8 Likes
0 Comments

An effective business analyst doesn’t just “write requirements.” Instead, the BA should think about the most appropriate way to represent requirements-related information in a given situation. Besides the traditional default of writing natural language statements, the BA should determine when a picture or some other representation would be valuable.

12715 Views
7 Likes
1 Comments

The once lowly business analyst is suddenly in high demand. Here's how to work well with the ones you've got.   The hottest job in IT right now might be the least "T" of them all: business analyst.
 

49302 Views
5 Likes
9 Comments

There is an exciting paradigm shift happening within the information systems (IS) field. This means a new breed of information systems is emerging as are new approaches for developing them. The good news is that business analysts may be more critical to the new paradigm than to past ones. 

20411 Views
11 Likes
2 Comments

Now that you’re prepared to work with executives, I’m sorry to inform you that the tough stuff is about to begin. While preparation and understanding are crucial elements, and speaking executive language further deepens our conversations, the real meat on the dog bone is taking the next step and beginning to develop your relationship and establishing yourself as a trusted advisor.
 

39874 Views
37 Likes
0 Comments

CBM Analyst is a simple and inexpensive way to implement business modeling. Business analysts may also choose to upgrade their business modeling solution to No Magic’s Cameo Business Modeler Plugin. The No Magic professional services team is ready to assist you in building and deploying a consistent business modeling solution.

34562 Views
7 Likes
0 Comments

As businesses acknowledge the value of business analysis – the result of the absolute necessity to drive innovation through projects – they are struggling to figure out three things: (1) What are the characteristics of their current BA workforce, and how capable does their BA team need to be?  (2) What is needed to build a mature BA Practice?  (3) How are we going to get there?

23951 Views
5 Likes
6 Comments

Business value is a new indicator for project success. Huh? You may be wondering what ever happened to the good ole scope, schedule, and budget. They are still there and measured, but what the 2012 trends have been pointing to is that a project completed within scope, schedule, and budget and not be successful.

33229 Views
27 Likes
2 Comments

In writing a business requirements document (BRD), the business analyst needs to document who can access the solution (assuming software) and what data can be created, updated, read, and deleted (CRUD). In other words, a security model that a security analyst can build access profiles with the appropriate privileges.  This article provides the business analyst a method for documenting a security model in the BRD based on information extracted from Use Case and Class models

Page 55 of 67First   Previous   50  51  52  53  54  [55]  56  57  58  59  Next   Last   

 



Upcoming Live Webinars

 




Copyright 2006-2025 by Modern Analyst Media LLC