- Opinions
By search term
By topic
By tag
- Testing (9)
- Agile (29)
- Approaches (42)
- Attributes (4)
- Business Analysis (21)
- Elicitation (27)
- Estimation (5)
- Prioritization (7)
- Team (17)
- User Story (11)
- Template (3)
- Framework (10)
- Goals (8)
- Reuse (2)
- Software Engineering (9)
- Traceability (9)
- Perception (10)
- Management (14)
- Verification (6)
- Study (15)
- Development (12)
- CPRE (5)
- Automation (6)
- Documentation (20)
- Software Quality (10)
- ReqIF (1)
- Standards (6)
- Analysis (19)
- Business Value (10)
- Metrics (5)
- Validation (10)
- Modeling (14)
- Security (3)
- SysML (3)
- Stakeholder (12)
- Big Data (4)
- Opinion (15)
- Literature (4)
By author
- Howard Podeswa (3)
- Rainer Grau (2)
- Erik van Veenendaal (1)
- Cristina Palomares (1)
- Carme Quer (1)
- Xavier Franch (2)
- Mats Wessberg (1)
- Kim Lauenroth (2)
- Joseph Aracic (1)
- IREB (1)
- Jens Schirpenbach (1)
- Alexander Rachmann (1)
- Jesko Schneider (1)
- Frank Engel (1)
- Dr. Ralph R. Young (2)
- Maria-Therese Teichmann (1)
- Eva Gebetsroither (1)
- Corinna Unterfurtner (1)
- Alexandra Kreuzeder (1)
- Harry Sneed (2)
Articles
Showing 22 articles tagged with Prioritization, Security, Traceability or Verification [max. 4 tags]
When shall does not need to be must
- Cross-discipline
- Methods
How you can use the natural partitioning of business events to flexibly synchronise your agile development.
- Methods
- Practice
Delegation of requirement verification. A key technique for more mature requirements management.
- Methods
An application of the IREB Handbook of Requirements Modeling
- Methods
Re-Use of Requirements via Libraries:
Opportunities & Approaches
Opportunities & Approaches
- Practice
- Cross-discipline
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
- Practice
- Methods
It seems evident to test designs or prototypes of software with end-users. But what about requirements?
- Methods
- Practice
Improving requirements quality by effort estimates
- Methods
How modeling can be useful to better define and trace requirements
- Practice
- Methods
Hands-on guidance for developing and managing security requirements
- Practice
Eliciting security requirements needs a different process
- Methods
- Practice
Classifying product techniques by requirements type
- Methods
An approach for iterative and requirements-based quality assurance in DevOps
- Methods
A new approach for requirements validation and rigorous verification.
- Practice
- Studies and Research
How Product Owners (POs), Business Analysts and Requirements Engineers Use Agile Requirements Engineering (RE) to optimize the work of the team and maximize the value delivered to stakeholders.
- Methods
Reverse Modeling and Up-To-Date Evolution of Functional Requirements in Alignment with Tests
- Studies and Research
Requirements Reuse with the PABRE Framework
- Methods
Verification and Validation of System Requirements by Animation and Automated Formal Analysis.
- Methods
From Requirements to Code
- Methods
- Practice
An Example from the Automation Industry
- Methods
- Practice
An agile and collaborative prioritization technique
- Practice
- Methods
‘A large elephant is in the room but we are not able or brave or willing enough to point at it’