Feasibility Study

Possibility of doing a project with some constraints like technology, budget and time.   Idea – Can it be turned into technology?   Estimate the Solution building cost and prove that it can be done. For small, relatively straight forward efforts, the solution approach can be determined by you. The …

Read More »

ROLE OF BUSINESS ANALYST IN SCRUM

SCRUM : The term “Scrum” was first coined by Hirotaka and Ikujiro in the year 1986 in a newspaper. Scrum is a framework comprising of iterative(sprint) process or methodology to achieve an ultimate goal. It can be implemented when the project is lagging behind or at the starting of the …

Read More »

Business Process Model

Introduction : In 1960, S. Williams introduced the term “Business Process Modelling” in the field of Systems Engineering in an article called “Business Process Modelling Improves Administrative Control”. In the 1990s this term became popular. Business Process Model defines a model in which specific input is given to get a …

Read More »

Do’s & Don’ts of a Business Analyst

The key priority for any Business Analyst is to try and understand the following: Do’s when you are getting started as a Business Analyst Understand what business does and how it does Establish how to improve current business processes Find the steps or tasks to help the implementation of new …

Read More »

Decision Analysis

Decision analysis is one of the 16 required techniques required for an effective business analyst. Decision analysis allows us to select a decision from a set of possible decision substitutions when ambiguities regarding the future exist. Stakeholders use decision analysis to examine a problem and make decisions in unreliable conditions.
The business …

Read More »

Fishbone Diagram

Fishbone Diagram: The Fishbone diagram is also known as the Ishikawa diagram. It is also called as “Cause and Effect Diagram” that helps the manager to structure a brainstorming session. It immediately sorts ideas into useful categories. Ishikawa identified five key areas which occur repeatedly in either type of analysis: …

Read More »

Security Testing

Security testing is done to identify the vulnerability of a software application. It is done to prevent malicious attacks from a third party. The purpose of the security test is to identify the weakness and loopholes of the software system to avoid the loss of information, revenue, and confidential data. …

Read More »

Root cause analysis

Root cause analysis Root cause analysis (RCA) is a well-thought-out process for identifying “root causes” of problems or events and an approach for responding to them. RCA is based on the basic idea that effective management needs/demands more than only “putting out fires” for problems that develop, but finding a way …

Read More »

Requirement Traceability Matrix

Requirement Traceability Matrix (RTM) is a document that maps and traces user needed thing with test cases. It takes by force/takes control of all needed things proposed by the client and needed thing traceability in a single document, delivered at the end of/final opinion of the Software development life cycle. The …

Read More »

RCA_Financial Institution.

  This is the first in a series of blogs in which I will share some of my thoughts about good complaint RCA practices observed in the course of our work across a wide range of firms. The problem of relying on complaint categorisation when performing RCA There are many …

Read More »

Watch Dragon ball super