- Methods
 - Practice
 
      By search term
      
    
    
      By topic
      
    
    
      By tag
      
    - Testing (9)
 - Agile (32)
 - Approaches (48)
 - Attributes (4)
 - Business Analysis (26)
 - Elicitation (29)
 - Estimation (5)
 - Prioritization (7)
 - Team (20)
 - User Story (13)
 - Template (3)
 - Framework (11)
 - Goals (9)
 - Reuse (2)
 - Software Engineering (14)
 - Traceability (9)
 - Perception (10)
 - Management (17)
 - Verification (6)
 - Study (15)
 - Development (16)
 - CPRE (5)
 - Automation (6)
 - Documentation (22)
 - Software Quality (11)
 - ReqIF (1)
 - Standards (8)
 - Analysis (20)
 - Business Value (13)
 - Metrics (5)
 - Validation (12)
 - Modeling (14)
 - Security (5)
 - SysML (3)
 - Stakeholder (13)
 - Big Data (4)
 - Opinion (18)
 - Literature (4)
 - AI (3)
 - Digital Design (3)
 
      By author
      
  - Howard Podeswa (3)
 - Rainer Grau (2)
 - Erik van Veenendaal (1)
 - Cristina Palomares (1)
 - Carme Quer (1)
 - Xavier Franch (2)
 - Mats Wessberg (1)
 - Kim Lauenroth (2)
 - Joseph Aracic (1)
 - IREB (1)
 - Jens Schirpenbach (1)
 - Alexander Rachmann (1)
 - Jesko Schneider (1)
 - Frank Engel (1)
 - Dr. Ralph R. Young (2)
 - Maria-Therese Teichmann (1)
 - Eva Gebetsroither (1)
 - Corinna Unterfurtner (1)
 - Alexandra Kreuzeder (1)
 - Harry Sneed (2)
 
Articles
Showing 20 articles tagged with Prioritization, Security or Testing
    GDPR compliance supports better overall protection
    
  
  
- Methods
 - Practice
 
    Neglecting personal data protection is not an option
    
  
  
- Methods
 - Practice
 
    Classifying product techniques by requirements type
    
  
  
- Practice
 - Studies and Research
 
    How Product Owners (POs), Business Analysts and Requirements Engineers Use Agile Requirements Engineering (RE) to optimize the work of the team and maximize the value delivered to stakeholders.
    
  
  
- Methods
 - Skills
 
    Endeavours to improve the situation are finally rewarded
    
  
  
- Practice
 - Cross-discipline
 
    Concept for the successful handling of integral NFRs in Scaled Agile Environments.
    
  
  
- Cross-discipline
 - Methods
 
    How you can use the natural partitioning of business events to flexibly synchronise your agile development.
    
  
  
- Practice
 - Methods
 
    It seems evident to test designs or prototypes of software with end-users. But what about requirements?
    
  
  
- Practice
 - Methods
 
    ‘A large elephant is in the room but we are not able or brave or willing enough to point at it’
    
  
  
- Methods
 - Opinions
 
    How to use requirements gathering techniques to determine product requirements from non-verbal subjects
    
  
  
- Opinions
 
    When shall does not need to be must
    
  
  
- Methods
 
    An approach for iterative and  requirements-based quality assurance in DevOps
    
  
  
- Opinions
 
    Do you know what acceptance criteria are?
    
  
  
- Practice
 - Methods
 
    Hands-on guidance for developing and managing security requirements
    
  
  
- Practice
 
    Eliciting security requirements needs a different process
    
  
  
- Methods
 
    Reverse Modeling and Up-To-Date Evolution of Functional Requirements in Alignment with Tests
    
  
  
- Methods
 
    Using Hypothesis Testing and Metrics to Drive Requirements Elicitation
    
  
  
- Practice
 - Methods
 
    Why Testers should have a closer look into Requirements Engineering
    
  
  
- Methods
 - Practice
 
    An agile and collaborative prioritization technique
    
  
  
- Skills
 
    Transitioning successfully from the IT side to business – and 5 questions you should ask yourself before moving from the tech side to Business Analysis