Articles

Showing 10 articles tagged with Estimation, Prioritization or Security

  • Practice
  • Methods
Learning from history: The case of Software Requirements Engineering
‘A large elephant is in the room but we are not able or brave or willing enough to point at it’
  • Methods
  • Practice
When the rubber hits the road
Improving requirements quality by effort estimates
  • Methods
  • Opinions
Challenges in the elicitation and determination of precise requirements from animal stakeholders
How to use requirements gathering techniques to determine product requirements from non-verbal subjects
  • Opinions
Sharing My Doubts on Shall / Should / Will etc.
When shall does not need to be must
  • Methods
KCycle: Knowledge-Based & Agile Software Quality Assurance
An approach for iterative and requirements-based quality assurance in DevOps
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Practice
Agility and Obligation
Part 2: The Art of Assigning Software Development
  • Practice
Agility and Obligation
Part 1: Why Fixed Price Projects Fail
  • Methods
  • Practice
Innovation Arena
An agile and collaborative prioritization technique