SlideShare une entreprise Scribd logo
1  sur  38
CAPTURING DATA REQUIREMENTS Best Practices in requirements gathering for data rich projects. Presented by: Greg Bhatia (Chief Instructor, MCOM IT Training) Visit us on the web at  www.mcomtraining.com
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],Since 2006, MCOM has trained hundreds of IT professionals in Business Analysis, CRM Data Strategy & Business Intelligence skills. Our unique approach towards  hands-on training  ensures that our students are able to immediately apply the skills & concepts learnt in class, at the workplace.  Greg Bhatia is a professional business analyst with over seven years of experience. He has led successful projects and has been applying business analysis techniques in many large organizations (TD Canada Trust, Microsoft, First Data, Sprint) in   Canada and the USA. Greg has extensive experience in CRM, Business Intelligence, Data warehousing and enterprise  reporting. Visit us on the web at  www.mcomtraining.com
Some Assumptions ,[object Object],[object Object],[object Object]
The Top down requirements process The Fabled Requirements Tree
The Top down requirements process In Reality: The Requirements Tree Stakeholder  Request Functional Non Functional Constraints
The Top down requirements process Stakeholder  Request Functional Non Functional Constraints Use Cases Accessibility Performance …… Software  Specifications Software  Specifications
The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data 1:1 1:1 1:1 1:1 1:1 1:n n:1
Use cases are useful but…
Use cases are useful but… A use case in software engineering and systems engineering is a description of a system’s behavior as it responds to a request that originates from outside of that system. In other words, a use case describes "who" can do "what" with the system in question. The use case technique is used to capture a system's behavioral requirements by detailing scenario-driven threads through the functional requirements. Reference:  http://en.wikipedia.org/wiki/Use_case   HOWEVER….. ,[object Object],[object Object],[object Object]
Use cases are useful but… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use cases are useful but… Stakeholder Intent Development Possibilities [Name],  [Email], [Phone], [Address 1],[Address 2], [City], [Province], [Postal Code] [First Name], [Last Name],  [Email], [Phone], [ Address 1], [Address 2 ], [City], [Province], [Postal Code] [Name],  [Email], [Phone],  [Address],  [City], [Province], [Postal Code] #1 Best case Scenario #2 Scenario #3 Scenario Application captures data in the following format: [First Name], [Last Name], [Email], [Phone], [Address 1], [Address 2], [City], [Province], [Postal Code]
Use cases are useful but… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use cases are useful but… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data, looking beyond the bits & bytes
Data, looking beyond the bits & bytes What is Data? The layman’s definition   (1) Distinct pieces of information, usually formatted in a special way. All software is divided into two general categories: data and programs. Programs are collections of instructions for manipulating data.  Strictly speaking, data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word.  (2) The term data is often used to distinguish binary machine-readable information from textual human-readable information. For example, some applications make a distinction between data files (files that contain binary data) and text files (files that contain ASCII data).  (3) In database management systems, data files are the files that store the database information, whereas other files, such as index files and data dictionaries, store administrative information, known as metadata.
Data, looking beyond the bits & bytes What is Data? The Business Analyst’s definition   A  collection of facts that have been organized and categorized for a pre determined purpose from which conclusions may be drawn;
Data, looking beyond the bits & bytes There is  Rich And then there is  Data Rich
Data, looking beyond the bits & bytes Settle on the best plan, exploit the dynamic within, develop it without. Follow the advantage, and master opportunity General Sun Tzu from  The Art of War 6th century BC
Data, looking beyond the bits & bytes Every Data Requirement discussion is an  opportunity  to enhance the BI capability (current of future) of the organization There is never a better time to have BI focused discussions than when requirements for the data capture systems are being reviewed
Data, looking beyond the bits & bytes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],,[Annual Income], [Gender], [Marital Status], [Language Preference]
Data, looking beyond the bits & bytes [Annual Income] + [Gender]+ [Marital Status] = Predictive Modeling / Data Mining [Language Preference] = Targeted CRM Campaigns PROJECT R.O.I
Why Plan for BI?
Why Plan for BI? Why Do Organizations need Business Intelligence capabilities? Running a business costs money and so organizations need to  maximize their revenue . This  optimization can only be achieved through insight  and it is this insight that is the key benefit a BI  solution delivers to an organization B.I Components Analysis Data Warehouse OLAP Cubes Predictive Models Reporting Ad-hoc reports Balanced Scorecards Dashboards
Why Plan for BI? You can plan ahead, or you can play catch-up BI is the Future, not an after thought
Why Plan for BI? It  Costs time & effort  to plan for BI  in every development initiative * This is an investment * It  Costs money  to re-configure a system to make  It “BI friendly “ * This is a sunk cost * … and you still  don’t get the full benefit  of a BI solution due to  missing Historical data
Why Plan for BI? Best Practices for BI Planning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive…
Data discovery – Ask and ye shall receive… One of the biggest challenges facing IT organizations is pinpointing the  location of critical data throughout the enterprise.   A  lot of time is wasted  in trying to identify data sources, owners and data capture strategies, time which is  better spent in Requirements Analysis Delaying the data discovery phase only makes the problem worse
Data discovery – Ask and ye shall receive… DATA DISCOVERY – COMMON PITFALLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive… DATA DISCOVERY – COMMON PITFALLS (Contd.) ,[object Object],[object Object],CAPTURING  INSUFFECIENT  OR  WRONG  DATA IS  WORSE  THAN NOT CAPTURING ANY DATA ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive… Asking the right questions is important ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive… Asking the right questions to the right people is equally important Question:   Is the data refreshed on a daily basis or weekly basis? Qualified Audience:  Data owner, Data SME Question:   We need to build an automated ETL pipe from this data source into our application. What would be the cost & timelines? Qualified Audience:  Data owner, Question:   What fields need to be captured in the data feed? Qualified Audience:  Business SME / Stakeholder / BI Champion Question:   At what grain should we capture the data? Qualified Audience:  BI Champion
Parting Thoughts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You for Attending For all your  Individual & Corporate Training  Needs Visit us on the web at  www.mcomtraining.com
QUESTIONS & ANSWERS

Contenu connexe

Tendances

Data Architecture for Data Governance
Data Architecture for Data GovernanceData Architecture for Data Governance
Data Architecture for Data GovernanceDATAVERSITY
 
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...DATAVERSITY
 
03. Business Information Requirements Template
03. Business Information Requirements Template03. Business Information Requirements Template
03. Business Information Requirements TemplateAlan D. Duncan
 
Data Quality Best Practices
Data Quality Best PracticesData Quality Best Practices
Data Quality Best PracticesDATAVERSITY
 
Enterprise Data Architecture Deliverables
Enterprise Data Architecture DeliverablesEnterprise Data Architecture Deliverables
Enterprise Data Architecture DeliverablesLars E Martinsson
 
Modern Data architecture Design
Modern Data architecture DesignModern Data architecture Design
Modern Data architecture DesignKujambu Murugesan
 
Gathering And Documenting Your Bi Business Requirements
Gathering And Documenting Your Bi Business RequirementsGathering And Documenting Your Bi Business Requirements
Gathering And Documenting Your Bi Business RequirementsWynyard Group
 
Building an Effective Data Warehouse Architecture
Building an Effective Data Warehouse ArchitectureBuilding an Effective Data Warehouse Architecture
Building an Effective Data Warehouse ArchitectureJames Serra
 
Capturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And ReportsCapturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And ReportsJulian Rains
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at ScaleDATAVERSITY
 
Enterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureEnterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureDATAVERSITY
 
Data Catalog as a Business Enabler
Data Catalog as a Business EnablerData Catalog as a Business Enabler
Data Catalog as a Business EnablerSrinivasan Sankar
 
Microsoft Power BI Technical Overview
Microsoft Power BI Technical OverviewMicrosoft Power BI Technical Overview
Microsoft Power BI Technical OverviewDavid J Rosenthal
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best PracticesDATAVERSITY
 
BI-Analytics-Overview.pptx
BI-Analytics-Overview.pptxBI-Analytics-Overview.pptx
BI-Analytics-Overview.pptxPerumalPitchandi
 
Modernize & Automate Analytics Data Pipelines
Modernize & Automate Analytics Data PipelinesModernize & Automate Analytics Data Pipelines
Modernize & Automate Analytics Data PipelinesCarole Gunst
 
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...Dr. Arif Wider
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceDATAVERSITY
 

Tendances (20)

Data modeling for the business
Data modeling for the businessData modeling for the business
Data modeling for the business
 
Data Architecture for Data Governance
Data Architecture for Data GovernanceData Architecture for Data Governance
Data Architecture for Data Governance
 
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
 
03. Business Information Requirements Template
03. Business Information Requirements Template03. Business Information Requirements Template
03. Business Information Requirements Template
 
Data Quality Best Practices
Data Quality Best PracticesData Quality Best Practices
Data Quality Best Practices
 
Enterprise Data Architecture Deliverables
Enterprise Data Architecture DeliverablesEnterprise Data Architecture Deliverables
Enterprise Data Architecture Deliverables
 
Modern Data architecture Design
Modern Data architecture DesignModern Data architecture Design
Modern Data architecture Design
 
Gathering And Documenting Your Bi Business Requirements
Gathering And Documenting Your Bi Business RequirementsGathering And Documenting Your Bi Business Requirements
Gathering And Documenting Your Bi Business Requirements
 
Building an Effective Data Warehouse Architecture
Building an Effective Data Warehouse ArchitectureBuilding an Effective Data Warehouse Architecture
Building an Effective Data Warehouse Architecture
 
Capturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And ReportsCapturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And Reports
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Enterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureEnterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data Architecture
 
Data Catalog as a Business Enabler
Data Catalog as a Business EnablerData Catalog as a Business Enabler
Data Catalog as a Business Enabler
 
Microsoft Power BI Technical Overview
Microsoft Power BI Technical OverviewMicrosoft Power BI Technical Overview
Microsoft Power BI Technical Overview
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
 
BI-Analytics-Overview.pptx
BI-Analytics-Overview.pptxBI-Analytics-Overview.pptx
BI-Analytics-Overview.pptx
 
Modernize & Automate Analytics Data Pipelines
Modernize & Automate Analytics Data PipelinesModernize & Automate Analytics Data Pipelines
Modernize & Automate Analytics Data Pipelines
 
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...
 
Data Lake,beyond the Data Warehouse
Data Lake,beyond the Data WarehouseData Lake,beyond the Data Warehouse
Data Lake,beyond the Data Warehouse
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
 

Similaire à Capturing Data Requirements

Effectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB ImplementationEffectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB ImplementationAntonio Rolle
 
1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docx1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docxdrennanmicah
 
Blank Paper To Write On
Blank Paper To Write OnBlank Paper To Write On
Blank Paper To Write OnKayla Miller
 
Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015Olivier Béghain
 
Overview of business intelligence
Overview of business intelligenceOverview of business intelligence
Overview of business intelligenceAhsan Kabir
 
Complexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP EnvironmentComplexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP Environmenteprentise
 
IPM Individual Assignment.docx
IPM Individual Assignment.docxIPM Individual Assignment.docx
IPM Individual Assignment.docxMikealay Desta
 
Master Data Management methodology
Master Data Management methodologyMaster Data Management methodology
Master Data Management methodologyDatabase Architechs
 
Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)Maria Pulsoni-Cicio
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - finalAndrew White
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture Hamzazafeer
 
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryAge of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryInside Analysis
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015Mark S. Mahre
 
College management
College managementCollege management
College managementanandhan30
 
Bhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodologyBhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodologyBhawani N Prasad
 
Integrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s GuideIntegrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s GuideSalesforce.org
 
Concurrency Technology Roadmap
Concurrency Technology Roadmap Concurrency Technology Roadmap
Concurrency Technology Roadmap Concurrency, Inc.
 

Similaire à Capturing Data Requirements (20)

Effectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB ImplementationEffectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB Implementation
 
Acc 340 Preview Full Course
Acc 340 Preview Full CourseAcc 340 Preview Full Course
Acc 340 Preview Full Course
 
1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docx1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docx
 
Acc 340 Preview Full Course
Acc 340 Preview Full Course Acc 340 Preview Full Course
Acc 340 Preview Full Course
 
Blank Paper To Write On
Blank Paper To Write OnBlank Paper To Write On
Blank Paper To Write On
 
Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015
 
Data analyst
Data analystData analyst
Data analyst
 
Overview of business intelligence
Overview of business intelligenceOverview of business intelligence
Overview of business intelligence
 
Complexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP EnvironmentComplexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP Environment
 
IPM Individual Assignment.docx
IPM Individual Assignment.docxIPM Individual Assignment.docx
IPM Individual Assignment.docx
 
Master Data Management methodology
Master Data Management methodologyMaster Data Management methodology
Master Data Management methodology
 
Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture
 
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryAge of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide Discovery
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
 
College management
College managementCollege management
College management
 
Bhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodologyBhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodology
 
Integrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s GuideIntegrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s Guide
 
Concurrency Technology Roadmap
Concurrency Technology Roadmap Concurrency Technology Roadmap
Concurrency Technology Roadmap
 

Dernier

Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Dernier (20)

Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

Capturing Data Requirements

  • 1. CAPTURING DATA REQUIREMENTS Best Practices in requirements gathering for data rich projects. Presented by: Greg Bhatia (Chief Instructor, MCOM IT Training) Visit us on the web at www.mcomtraining.com
  • 2.
  • 3.
  • 4.
  • 5. The Top down requirements process The Fabled Requirements Tree
  • 6. The Top down requirements process In Reality: The Requirements Tree Stakeholder Request Functional Non Functional Constraints
  • 7. The Top down requirements process Stakeholder Request Functional Non Functional Constraints Use Cases Accessibility Performance …… Software Specifications Software Specifications
  • 8. The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
  • 9. The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
  • 10. The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data 1:1 1:1 1:1 1:1 1:1 1:n n:1
  • 11. Use cases are useful but…
  • 12.
  • 13.
  • 14. Use cases are useful but… Stakeholder Intent Development Possibilities [Name], [Email], [Phone], [Address 1],[Address 2], [City], [Province], [Postal Code] [First Name], [Last Name], [Email], [Phone], [ Address 1], [Address 2 ], [City], [Province], [Postal Code] [Name], [Email], [Phone], [Address], [City], [Province], [Postal Code] #1 Best case Scenario #2 Scenario #3 Scenario Application captures data in the following format: [First Name], [Last Name], [Email], [Phone], [Address 1], [Address 2], [City], [Province], [Postal Code]
  • 15.
  • 16.
  • 17. Data, looking beyond the bits & bytes
  • 18. Data, looking beyond the bits & bytes What is Data? The layman’s definition (1) Distinct pieces of information, usually formatted in a special way. All software is divided into two general categories: data and programs. Programs are collections of instructions for manipulating data. Strictly speaking, data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word. (2) The term data is often used to distinguish binary machine-readable information from textual human-readable information. For example, some applications make a distinction between data files (files that contain binary data) and text files (files that contain ASCII data). (3) In database management systems, data files are the files that store the database information, whereas other files, such as index files and data dictionaries, store administrative information, known as metadata.
  • 19. Data, looking beyond the bits & bytes What is Data? The Business Analyst’s definition A collection of facts that have been organized and categorized for a pre determined purpose from which conclusions may be drawn;
  • 20. Data, looking beyond the bits & bytes There is Rich And then there is Data Rich
  • 21. Data, looking beyond the bits & bytes Settle on the best plan, exploit the dynamic within, develop it without. Follow the advantage, and master opportunity General Sun Tzu from The Art of War 6th century BC
  • 22. Data, looking beyond the bits & bytes Every Data Requirement discussion is an opportunity to enhance the BI capability (current of future) of the organization There is never a better time to have BI focused discussions than when requirements for the data capture systems are being reviewed
  • 23.
  • 24. Data, looking beyond the bits & bytes [Annual Income] + [Gender]+ [Marital Status] = Predictive Modeling / Data Mining [Language Preference] = Targeted CRM Campaigns PROJECT R.O.I
  • 26. Why Plan for BI? Why Do Organizations need Business Intelligence capabilities? Running a business costs money and so organizations need to maximize their revenue . This optimization can only be achieved through insight and it is this insight that is the key benefit a BI solution delivers to an organization B.I Components Analysis Data Warehouse OLAP Cubes Predictive Models Reporting Ad-hoc reports Balanced Scorecards Dashboards
  • 27. Why Plan for BI? You can plan ahead, or you can play catch-up BI is the Future, not an after thought
  • 28. Why Plan for BI? It Costs time & effort to plan for BI in every development initiative * This is an investment * It Costs money to re-configure a system to make It “BI friendly “ * This is a sunk cost * … and you still don’t get the full benefit of a BI solution due to missing Historical data
  • 29.
  • 30. Data discovery – Ask and ye shall receive…
  • 31. Data discovery – Ask and ye shall receive… One of the biggest challenges facing IT organizations is pinpointing the location of critical data throughout the enterprise. A lot of time is wasted in trying to identify data sources, owners and data capture strategies, time which is better spent in Requirements Analysis Delaying the data discovery phase only makes the problem worse
  • 32.
  • 33.
  • 34.
  • 35. Data discovery – Ask and ye shall receive… Asking the right questions to the right people is equally important Question: Is the data refreshed on a daily basis or weekly basis? Qualified Audience: Data owner, Data SME Question: We need to build an automated ETL pipe from this data source into our application. What would be the cost & timelines? Qualified Audience: Data owner, Question: What fields need to be captured in the data feed? Qualified Audience: Business SME / Stakeholder / BI Champion Question: At what grain should we capture the data? Qualified Audience: BI Champion
  • 36.
  • 37. Thank You for Attending For all your Individual & Corporate Training Needs Visit us on the web at www.mcomtraining.com