for the process. Returning a book is basically the same process.
Do you remember what you said on the last article? The first step is to identify users from the stakeholders. and define the relationships between these users. Users here refer to those stakeholders who will have a relationship with the system to be built. indicated by the following figure. This picture shows all the users and the relationships between them. It should be explained that the users here refer to the business user, n
1, Data tracking staff
Although the person in this job is not yet known as a data analyst, but often do such work people also claim to be data analyst, such people, only through the XXX system to see limited data, and rarely to deal with data, and even do not understand the origin and meaning of data, but only mechanical to see the data copied out, Forwarded to the appropriate person.
This kind of person
People should be familiar with these two words, but the meaning contained in the word may not be particularly clear. First of all, it must be explained that programmers and system analysts do not exist who senior who is inferior to the difference, they are two professions, the requirements of professional skills are completely different. So it's wrong to say that a powerful programmer is a system analyst. Of course, the system analyst's skills require
that the reader has got the book. Of course, the reader is required to pay for the process. Returning a book is basically the same process.
Well, through this conversation, we've basically learned about the system goals. Some anxious system analysts are already ready to start asking questions about the process of borrowing books, and even some people have drawn up a Web page in mind with years of development experience to consider how to implement the system.
The author wants to say is, pleas
attribute.Database design:Requirements Analysis: Collect and analyze the information needs and processing requirements of the users, get the required information of the design system, and establish the system documentation.Conceptual structure Design: all the data and processing requirements provided by the requirement are abstracted and synthesized, and the data of user environment and their interrelated conceptual model are constructed according to certain crime, namely user's data model or e
Problems encountered during the development of CMMsSome time ago, I took over a cmmb development project, mainly for bug fixing and optimization. Now I have basically finished it. The standard document of cmmb has been roughly viewed. Due to the
What is a process?
A process is a series of execution steps for a specified target.
What is process improvement?
Process improvement is to help achieve business goals, not to improve
Pivot of leverage: Process [Key deciding factors of product
Document directory
Project Supervision and Control Methods
Project Supervision and Control Method 1. Process and guidelines for establishing project monitoring
1. Establish a policy: the project monitoring policy is described in our
1.
For Gg in PA, how is gg2 implemented in Level 2? Is it required to fully implement GG 2 and gg3 in level 3. Gp2.1 to plan and execute, we need to have a policy in ossp/01_policy/
Definition in the articles of association of macro TechnologyGp2.2
Scenario:
Yesterday, I went to the primary Party's site to learn about the work of the project team. I learned that Project L has started preliminary acceptance work. In addition to preliminary acceptance work, I also developed the changes proposed
EPG: Electronic Program Guide is an electronic program guide, which is a data structure applied in the broadcast and television system. It describes all the project information provided to the TV audience, interactive TV is an important
The full name of cmme is Capability Maturity Model integration, that is, the Software Capability Maturity Model integration model. There are 5 levels and 25 process areas (PA ).
1. Initial level (initial)
Software processes are unordered,
Document directory
Risk management methods
Risk management method 1. establish risk management processes and policies
1. Establish a policy: the risk management policy is described in our organizational process policy.
2. creation process: the
I got a training about the cmme from colleague in the team meeting at yestoday. I heared the cmme long time ago, but it is the first time start to learn it. what's the cmme? The offiical definition is Capability Maturity Model Integration . It is a
Simple Learning
Cmme ,
Impression There are three profound terms: Commitment, quantification, and goal. From these three words, I have a simple idea about a question that everyone is asking. The question is: why some of them have implemented cmmi4
The predecessor of the cmme model is SW-CMM and SE-CMM, the former is what we refer to CMM. The main difference between cmme and SW-CMM is that it covers many fields; so far it includes four areas:
1Software Engineering (SW-CMM)
Software
On the selection of software demand analysis methods and tools -- Application in the Communication Industry
【Abstract]
This article takes the Business Report System Development of a communication company as an example to discuss the selection of
I found that today, when Oo and UML are almost the same, many system analysts still have a thorough understanding of OO and UML, and even many system analysts who have been using UML for a long time.
So I plan to write a series of articles to
According to foreign media reports, Twitter chief executive Costello recently announced the resignation under outside pressure, Twitter is seen as a result of its performance and former rival Facebook, the gap is getting bigger. But a recent US
Microsoft has pushed Win10 's first anniversary last week to update the official version of the system, which brings a lot of feature updates, but unfortunately after July 29, the Win10 free upgrade has ended, which means that later Win7, Win8.1
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.