Jan 12, 2025
3248 Views
0 Comments
Software consultant Tim Lister defined project success as “meeting the set of all requirements and constraints held as expectations by key stakeholders.” There’s a vast body of literature on software requirements. In contrast, little is written about the various kinds of constraint...
Software consultant Tim Lister defined project success as “meeting the set of all requirements and constraints held as expectations by key stakeholders.” There’s ...
In this series’ first article, Beyond Tools and Processes: Strategies for Successful Software Development Teams, we introduced the concept of reflective practices. Reflection...
Imagine you have just led a successful incident response effort, restoring order after a critical cyberattack. Systems are back online, data is secured, and the team breathes a sig...

BA Humor & Cartoons

Needed - Software Developer to Fix BugsTime Marchine RequirementsIs the Apocalypse Coming in the New Year?

Templates & Aides

Templates & AidesTemplates & Aides: find and share business analysis templates as well as other useful aides (cheat sheets, posters, reference guides) in our Templates & Aides repository.  Here are some examples:
* Requirements Template
* Use Case Template
* BPMN Cheat Sheet

Community Blog - Latest Posts

Leveraging Blockchain Technology for Enhanced Data Security in Business Operations
In an age where data breaches and cyberattacks are becoming more frequent and sophisticated, businesses are searching for robust solutions to safeguard their data. Blockchain technology has emerged as a promising tool in this quest, offering a way to secure data with unparalleled reliability. Although initially known for powering cryptocurrencies l...
Building software products that solve actual customer concerns and generate business success is not an easy fit. Product executives battle strong competition, tight timelines, and high expectations, all while seeking to offer value. While success gives the opportunity to showcase approaches and frameworks, the reality is that building excellent pro...
Business Impact Analysis(BIA): Assessing the Potential Impact of a Cybersecurity Incident on Business Operations
In today’s highly interconnected society, businesses depend on technology even more than before. While offering opportunities for innovation and creativity, businesses are exposed to various cybersecurity threats that can disrupt operations, damage reputation, and result in substantial financial losses. It is crucial to carry out a comprehens...

MA Blog - Selected Posts

The Dirty Harry Approach to Requirements, or “Are you Feeling Lucky, Punk?” Solve Problems First, Ask Questions Later - Part 2
In Part 1, we learned that the less precise things are, the easier it is to understand them. Thus the paradox: how do you get precise requirements and... Read More...

When the Client Isn't the Customer
Usually when a Business Analyst is working on a project the client (which I’ll define as the party or stakeholder who receives the benefit of the Anal... Read More...

Continuing a project in the penumbra...
INTRODUCTION Being dropped in the middle of a project that is already in a bad shape (over budget, over schedule and under compliance) is not easy (o... Read More...

 



Upcoming Live Webinars

 




Copyright 2006-2025 by Modern Analyst Media LLC