requirements | TechWell
Development Agile Test & Quality Assurance Project Management Requirements
CM & ALM Devops Cloud Mobile People & Teams

By Topic

Requirements

Requirements and Business Analysis Stories
group at table The World Has Product Ideas—And So Can You

From where do organizations—both big and small—get product ideas? Most often, pioneers and revolution makers have ideas that are homegrown, but today the market is such that the world has ideas. Our industry has plenty of patterns, trends, and ideas to work on and augment. 

Mukesh Sharma's picture
Mukesh Sharma
accessibility Are You Reluctant to Venture into Accessibility Engineering?

Organizations are beginning to give a lot of attention and importance to accessibility engineering as part of their usability efforts; however, this has not translated into implementation strategies that have reached the market. Why is there a reluctance to venture into full-fledged accessibility engineering?

Mukesh Sharma's picture
Mukesh Sharma
A list of requirements with checkmarks Testing the Requirements: A Guide to Requirements Analysis

Everyone knows testing requirements is important, and everyone says they do it, but it seems like no one knows exactly how. The best way to solve this problem is to introduce a requirements analysis stage that has to be done before coding starts. No one knows a product as well as a tester who works with it every day!

Evgeny Tkachenko's picture
Evgeny Tkachenko
User stories Use Continuous Backlog Grooming to Refine Agile Requirements

Continuous backlog grooming means systematically refining your user stories: breaking up larger stories, obtaining detailed requirements, writing the requirements in terms of acceptance criteria and acceptance tests, and sharing and refining these details with the team. Acceptance test-driven development can help.

Susan Brockley's picture
Susan Brockley
stealth bomber The Balance between Being Stealth and Being Public during Product Development

While end user data protection is important from a business to customer perspective, businesses themselves have their share of data protection problems. Organizations need to find the balance between being in a stealth mode and being too public during product development.

Mukesh Sharma's picture
Mukesh Sharma
Acceleration Build the Right Things and Build Them Fast: Accelerate the Continuous Delivery Pipeline

When most people think about continuous delivery, they think of improving the build-test-deploy-operate cycle. They don’t think about how to improve the intake process. Ensuring that quality is built into the application—not tested for after the fact—is the key to achieving accelerated continuous delivery.

Alex Martins's picture
Alex Martins
Validate Your Core Business Assumptions Early On

Verifying whether a product is being built per specifications is only solving half of the problem. Validation is a very significant activity performed by testers to ensure that the final product is ready for consumption by users and answers an important question. Are we building the right product?

Mukesh Sharma's picture
Mukesh Sharma
Are Any of Yours on the List of Worst Passwords of 2015?

Here’s a Top 25 List you do not want to be on: The Worst Passwords of 2015. Password management company SplashData released its annual list of the 25 worst Internet passwords, and what’s truly mindboggling is that for both 2015 and 2014, the same two passwords are at the top of the list.

Pamela Rentz's picture
Pamela Rentz