Spindustry News

Azure For IT Professionals

Learn more about implementing Azure as part of your infrastructure.

Staying Sharp on Microsoft Office Can Save Time & Money

Learning the latest Microsoft Office tips and tricks can benefit you greatly.

"How do I determine if this new technology is for real?"

Michael Bird explains how to navigate new technology waters.
Training partners

Spindustry Training

spindustrytraining.com - (515) 334-9556

Bookmark and Share

Recognizing and Controlling Requirements Risk - Online

Course Code: STTA REQRISK
Length: 3 Days
Tuition: $1,395.00
Official

Schedule for this Course

There are no dates scheduled for this course.
If you would like to be added to the wait list for this class Click Here

Course Description:

PMI: 14 PDUs
NASBA: 12 CPEs
IIBA: 12 CDUs

Practical Safety Tactics for Building Your Control Strategy.

Learn how to:

  • Understand the nature of requirements risk and the need to control it
  • Avoid requirements-based failures by reconfirming needs and feasibility, managing customer expectations, prioritizing requirements, and incrementally committing to a project
  • Mitigate the impact of requirements-based defects by requiring frequent demos, decoupling vision from build, and building in multilane cycles
  • Minimize communication problems using rich definitions, algebraic formulas, spec patterns, and picture requirements information
  • Monitor requirements status by tracking requirements instability and growth, the accuracy of assumptions, and stakeholder participation
  • Identify unclear, imprecise, and missing information using requirements analysis and reviews with stakeholders
  • Staff for requirements development by building a cross-functional team and practicing team success factors
  • Plan for requirements risk management by eliciting meta-requirements, by brainstorming risks, risk indicators, and root causes, and by developing a requirements risk management strategy
  • Prepare for requirements risk management by formulating a baseline requirements development process, providing tools, developing defect and root cause profiles, and conducting requirements retrospectives

Increase the likelihood of project success by using a safer development process

Developing Effective Requirements is a Risky Business
The Challenge: Requirements development is hard. Major requirements problems remain, especially on larger projects, even when basic requirements development and management practices are effectively used.

Part of the problem is that requirements development is less about neat technical activities like specifying and analyzing and more about messy human activities like teaming, discovering, communicating, and negotiating. Human factors get in the way of efficiency. High precision is unnatural to many people. Ambiguous communication is the rule, not the exception. Checking requirements is very hard  be best practice reviews miss 2/3 of the defects. Deep understanding is acquired in layers over time and cannot be scheduled. None of this will change as long as humans are involved.

Some, for example in the agile community, believe that large-scale requirements cannot be done effectively  an and they may be right. History provides strong evidence for this view. A different interpretation is that just doing the basics is not enough.

Risk Management is Project Management for Adults (DeMarco & Lister)
The Response: Waterfall, spiral, agile, or lean; no matter how you develop your systems, the basic requirements development practices in these methods do not adequately control requirements risk. Just as seat belts and air bags should be installed in a car, each of these development methods should be supplemented with risk control tactics. This workshop surveys more than 50 safety tactics that you can use in any combination to develop a requirements risk management strategy tailored to the dangers in your situation. You will learn about tactics for avoiding failures, mitigating the impact of defects, minimizing communication problems, and monitoring status as well as tactics for staffing, planning, and preparing for requirements risk management.

Discover Practical Tactics that Reduce Project Risk
The Workshop: This two-day workshop will give you an opportunity to practice some of the safety tactics and experience their impact firsthand. Lively lectures along with practical examples and group discussions and exercises will provide you with the understanding and experience needed to help make your requirements safer.

In-Class Team Exercises:
A major component of the course will be hands-on exercises. Exercises let you experience the detailed use of some of the tactics. Sharing this experience with others exposes you to alternative viewpoints and approaches. Case study discussions challenge you to apply the tactics you have learned. Specifically, you will:

  • Identify your requirements risks
  • Identify challenges of incremental commitment
  • Create rich definitions including a derived value, quality profile, and action contract
  • Replace a magic number with a derived value
  • Create a state transition table
  • Interpret requirements change measures
  • Brainstorm risks and tactics for a case study
  • Walk through the tactics usage process

20 Immediate Benefits of Taking This Class:

  1. Understand the challenges of precise communication.
  2. Recognize the danger of text blocks and value of patterns and pictures.
  3. Learn the challenges of stakeholder differences and team building.
  4. Factor requirements risk into six types and focus on controlling each type.
  5. Increase project safety using requirements risk management tactics.
  6. Learn how to forecast danger accurately.
  7. Create a continuous risk management process
  8. Understand the need to manage customer expectations and resolve conflicts.
  9. Keep a lookout for failure and commit incrementally.
  10. Understand the need to require frequent demos of understanding
  11. Learn to use rich definitions and algebraic formulas.
  12. Know why requirements development is so dangerous.
  13. Focus on quality and environmental requirements early.
  14. Understand the causes and impact of unstable requirements.
  15. See how to monitor requirements instability and growth.
  16. Know why longer specs need incremental review.
  17. Learn which tools support safer requirements.
  18. Plan to create a cross-functional team.
  19. Understand your choices when defining a baseline requirements process.
  20. Use requirements checking techniques that work.

Who Should Attend this Business Analysis Course

This workshop will be valuable to all those concerned with controlling systems development risk.
These include:

  • Project sponsors
  • System users
  • Development directors
  • Project managers and leads
  • Requirements managers, leads and analysts
  • System architects
  • Functional designers
  • Verification and test leads
  • Quality assurance staff
  • Process improvement leads

Prerequisites

A minimum of one year of requirements development experience is recommended.

Course Outline:

Section I. Why is Requirements Development So Hard?
Of all project activities, requirements development has changed the least in approach and results. Its importance is recognized, so why aren't we doing better? This section describes the nature of the challenge.

  • Challenge of communication
  • Why review and analysis don’t fit find most defects
  • Role of human factors
  • Why requirements are dangerous

Section II. Types of Requirements Risk
There are many things that impact the quality of requirements and many things that requirements can affect. We factor requirements risk into seven groups and describe the contents of each.

  • Application risk
  • Stakeholder risk
  • Process risk
  • Resource risk
  • Change risk
  • Implementation risk
  • Defect risk

EXERCISE: Participants identify their requirements risks. Then, teams share their risks with the entire group.

Section III. Requirements Risk Management
After admitting the danger, a project team must control its requirements risk. This section describes the challenges of a risk management process.

  • Recognizing requirements risk
  • Forecasting project-specific dangers
  • Developing a strategy
  • Monitoring reality

Section IV. Safety Tactics 1: Avoiding Requirements-based Failures
Projects become famous failures by promising a lot, consuming resources, and delivering little or nothing. Tactics in this section focus on avoiding this type of fame.

  • Reconfirm reality and satisfiability of stated needs
  • Triage and prioritize requirements
  • Manage customer expectations
  • Reconfirm project feasibility or reduce scope
  • Identify and resolve conflicts early
  • Commit incrementally

EXERCISE: The entire group identifies challenges of incremental commitment — why might it be hard?

Section V. Safety Tactics 2: Mitigating Impact of Requirements-based Problems
Requirements will conflict and be defective, despite your best efforts. This section describes tactics that reduce the impact of these problems.

  • Require frequent demos of understanding
  • Decouple vision from build
  • Prototype unfamiliar functions and interfaces
  • Subdivide project scope
  • Build in multilane cycles

Section VI. Safety Tactics 3a: Minimizing Communication Problems
Clear project communication is one of the core challenges of system development. Natural language is a major problem, because it is so natural. This section describes alternatives and supplements to text blocks.

  • Maintain a climate of safety and respect
  • Document assumptions
  • Mark intentional imprecision
  • Use rich definitions
  • Use derived values rather than "magic numbers"
  • Identify user types and create user personas
  • Clarify with examples and measures
  • Structure information with spec patterns
  • Picture requirements information
  • Capture context

EXERCISE: Teams create rich definitions including a derived value, quality profile, and action contract. Team definitions are shared with the entire group.

EXERCISE: Teams replace a "magic number" with a derived value.

EXERCISE: Teams create a state transition table and then share with the entire group.

Section VII. Safety Tactics 3b: Minimizing Other Problems
Beyond communication, there are other problems that can be reduced with specific minimization tactics. This section describes these added tactics.

  • Improve results of current requirements development process
  • Identify minimal sets of marketable features
  • Focus on quality and environmental requirements early
  • Identify impacts and mitigation strategies
  • Analyze benefits, risks, priority, and cost of proposed requirements and changes

Section VIII. Safety Tactics 4: Monitoring Requirements Status
Requirements and their related information (e.g. defects) must be monitored to detect expected and unexpected risk. This section describes tactics that provide this monitoring.

  • Monitor requirements instability and growth
  • Monitor accuracy of assumptions, expectations, and priorities
  • Monitor stakeholder participation
  • Use workshops to find issues early
  • Incrementally review long specifications
  • Identify unclear, imprecise, and missing information
  • Estimate defect risk
  • Verify satisfaction arguments of derived requirements
  • Track requirements defects
  • Analyze and classify requirements defects and root causes

EXERCISE: The entire group interprets requirements change measures.

Section IX. Safety Tactics 5: Staffing for Requirements Development
People, their involvement, knowledge, and behavior make all the difference. This section focuses on getting the right people, with the right perspective and skills to do the job right.

  • Build cross-functional team
  • Supplement with outside knowledge, skill, and experience
  • Replace underperformers and disruptors
  • Train stakeholders in technical communication
  • Immerse stakeholders

Section X. Safety Tactics 6: Planning for Requirements Risk Management
To get risk management off to a solid start, you need to understand what information people need and what bad things might happen as you try to get it. This section deals with creating effective strategies for requirements development and risk management.

  • Elicit meta-requirements
  • Brainstorm risks and tactics
  • Identify risk indicators and root causes
  • Customize requirements development and specification strategy
  • Customize, carry out, and monitor requirements risk management strategy

EXERCISE: Teams brainstorm risks and tactics for a case study and then share results with the entire group.

Section XI. Safety Tactics 7: Preparing for Requirements Risk Management
Some tactics (e.g. acquiring tools) involve the creation, outside a production project, of a foundation that enables other safety tactics (e.g. identify imprecise information) to be more effective during development. This section describes these foundational tactics.

  • Formulate baseline requirements process(es)
  • Systematize change management and requirements defect and failure tracking
  • Provide tools supporting safer requirements
  • Develop requirements defect and root cause profiles
  • Conduct requirements retrospectives

Section XII. Safety Tactics 8: Compensating for Requirements-based Problems
Because misunderstanding will occur and mistakes will be made, some design, implementation, and test work will need to be redone. Sometimes your worst fears will not be realized and your strategy will need adjusting.

  • Estimate and track requirements-based rework
  • Adjust for surprises, both good and bad

EXERCISE: Teams walk through the tactics usage process

back to top