SlideShare uma empresa Scribd logo
1 de 38
CAPTURING DATA REQUIREMENTS Best Practices in requirements gathering for data rich projects. Presented by: Greg Bhatia (Chief Instructor, MCOM IT Training) Visit us on the web at  www.mcomtraining.com
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],Since 2006, MCOM has trained hundreds of IT professionals in Business Analysis, CRM Data Strategy & Business Intelligence skills. Our unique approach towards  hands-on training  ensures that our students are able to immediately apply the skills & concepts learnt in class, at the workplace.  Greg Bhatia is a professional business analyst with over seven years of experience. He has led successful projects and has been applying business analysis techniques in many large organizations (TD Canada Trust, Microsoft, First Data, Sprint) in   Canada and the USA. Greg has extensive experience in CRM, Business Intelligence, Data warehousing and enterprise  reporting. Visit us on the web at  www.mcomtraining.com
Some Assumptions ,[object Object],[object Object],[object Object]
The Top down requirements process The Fabled Requirements Tree
The Top down requirements process In Reality: The Requirements Tree Stakeholder  Request Functional Non Functional Constraints
The Top down requirements process Stakeholder  Request Functional Non Functional Constraints Use Cases Accessibility Performance …… Software  Specifications Software  Specifications
The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data 1:1 1:1 1:1 1:1 1:1 1:n n:1
Use cases are useful but…
Use cases are useful but… A use case in software engineering and systems engineering is a description of a system’s behavior as it responds to a request that originates from outside of that system. In other words, a use case describes "who" can do "what" with the system in question. The use case technique is used to capture a system's behavioral requirements by detailing scenario-driven threads through the functional requirements. Reference:  http://en.wikipedia.org/wiki/Use_case   HOWEVER….. ,[object Object],[object Object],[object Object]
Use cases are useful but… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use cases are useful but… Stakeholder Intent Development Possibilities [Name],  [Email], [Phone], [Address 1],[Address 2], [City], [Province], [Postal Code] [First Name], [Last Name],  [Email], [Phone], [ Address 1], [Address 2 ], [City], [Province], [Postal Code] [Name],  [Email], [Phone],  [Address],  [City], [Province], [Postal Code] #1 Best case Scenario #2 Scenario #3 Scenario Application captures data in the following format: [First Name], [Last Name], [Email], [Phone], [Address 1], [Address 2], [City], [Province], [Postal Code]
Use cases are useful but… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use cases are useful but… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data, looking beyond the bits & bytes
Data, looking beyond the bits & bytes What is Data? The layman’s definition   (1) Distinct pieces of information, usually formatted in a special way. All software is divided into two general categories: data and programs. Programs are collections of instructions for manipulating data.  Strictly speaking, data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word.  (2) The term data is often used to distinguish binary machine-readable information from textual human-readable information. For example, some applications make a distinction between data files (files that contain binary data) and text files (files that contain ASCII data).  (3) In database management systems, data files are the files that store the database information, whereas other files, such as index files and data dictionaries, store administrative information, known as metadata.
Data, looking beyond the bits & bytes What is Data? The Business Analyst’s definition   A  collection of facts that have been organized and categorized for a pre determined purpose from which conclusions may be drawn;
Data, looking beyond the bits & bytes There is  Rich And then there is  Data Rich
Data, looking beyond the bits & bytes Settle on the best plan, exploit the dynamic within, develop it without. Follow the advantage, and master opportunity General Sun Tzu from  The Art of War 6th century BC
Data, looking beyond the bits & bytes Every Data Requirement discussion is an  opportunity  to enhance the BI capability (current of future) of the organization There is never a better time to have BI focused discussions than when requirements for the data capture systems are being reviewed
Data, looking beyond the bits & bytes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],,[Annual Income], [Gender], [Marital Status], [Language Preference]
Data, looking beyond the bits & bytes [Annual Income] + [Gender]+ [Marital Status] = Predictive Modeling / Data Mining [Language Preference] = Targeted CRM Campaigns PROJECT R.O.I
Why Plan for BI?
Why Plan for BI? Why Do Organizations need Business Intelligence capabilities? Running a business costs money and so organizations need to  maximize their revenue . This  optimization can only be achieved through insight  and it is this insight that is the key benefit a BI  solution delivers to an organization B.I Components Analysis Data Warehouse OLAP Cubes Predictive Models Reporting Ad-hoc reports Balanced Scorecards Dashboards
Why Plan for BI? You can plan ahead, or you can play catch-up BI is the Future, not an after thought
Why Plan for BI? It  Costs time & effort  to plan for BI  in every development initiative * This is an investment * It  Costs money  to re-configure a system to make  It “BI friendly “ * This is a sunk cost * … and you still  don’t get the full benefit  of a BI solution due to  missing Historical data
Why Plan for BI? Best Practices for BI Planning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive…
Data discovery – Ask and ye shall receive… One of the biggest challenges facing IT organizations is pinpointing the  location of critical data throughout the enterprise.   A  lot of time is wasted  in trying to identify data sources, owners and data capture strategies, time which is  better spent in Requirements Analysis Delaying the data discovery phase only makes the problem worse
Data discovery – Ask and ye shall receive… DATA DISCOVERY – COMMON PITFALLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive… DATA DISCOVERY – COMMON PITFALLS (Contd.) ,[object Object],[object Object],CAPTURING  INSUFFECIENT  OR  WRONG  DATA IS  WORSE  THAN NOT CAPTURING ANY DATA ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive… Asking the right questions is important ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data discovery – Ask and ye shall receive… Asking the right questions to the right people is equally important Question:   Is the data refreshed on a daily basis or weekly basis? Qualified Audience:  Data owner, Data SME Question:   We need to build an automated ETL pipe from this data source into our application. What would be the cost & timelines? Qualified Audience:  Data owner, Question:   What fields need to be captured in the data feed? Qualified Audience:  Business SME / Stakeholder / BI Champion Question:   At what grain should we capture the data? Qualified Audience:  BI Champion
Parting Thoughts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You for Attending For all your  Individual & Corporate Training  Needs Visit us on the web at  www.mcomtraining.com
QUESTIONS & ANSWERS

Mais conteúdo relacionado

Mais procurados

Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
 
Data Quality Best Practices
Data Quality Best PracticesData Quality Best Practices
Data Quality Best PracticesDATAVERSITY
 
Wallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation RoadmapWallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation RoadmapDavid Walker
 
A tailored enterprise architecture maturity model
A tailored enterprise architecture maturity modelA tailored enterprise architecture maturity model
A tailored enterprise architecture maturity modelPaul Sullivan
 
Emerging Trends in Data Architecture – What’s the Next Big Thing
Emerging Trends in Data Architecture – What’s the Next Big ThingEmerging Trends in Data Architecture – What’s the Next Big Thing
Emerging Trends in Data Architecture – What’s the Next Big ThingDATAVERSITY
 
04. Logical Data Definition template
04. Logical Data Definition template04. Logical Data Definition template
04. Logical Data Definition templateAlan D. Duncan
 
Capturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And ReportsCapturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And ReportsJulian Rains
 
Building a strong Data Management capability with TOGAF and ArchiMate
Building a strong Data Management capability with TOGAF and ArchiMateBuilding a strong Data Management capability with TOGAF and ArchiMate
Building a strong Data Management capability with TOGAF and ArchiMateBas van Gils
 
SAP BI Requirements Gathering Process
SAP BI Requirements Gathering ProcessSAP BI Requirements Gathering Process
SAP BI Requirements Gathering Processsilvaft
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataAlan McSweeney
 
White Paper - Data Warehouse Project Management
White Paper - Data Warehouse Project ManagementWhite Paper - Data Warehouse Project Management
White Paper - Data Warehouse Project ManagementDavid Walker
 
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...Christopher Bradley
 
Strategic Approach To Data Migration Project Plan
Strategic Approach To Data Migration Project PlanStrategic Approach To Data Migration Project Plan
Strategic Approach To Data Migration Project PlanSlideTeam
 
Shadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureShadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureAlan McSweeney
 
Enterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureEnterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureDATAVERSITY
 
Capability Model_Data Governance
Capability Model_Data GovernanceCapability Model_Data Governance
Capability Model_Data GovernanceSteve Novak
 
Implementing the Data Maturity Model (DMM)
Implementing the Data Maturity Model (DMM)Implementing the Data Maturity Model (DMM)
Implementing the Data Maturity Model (DMM)DATAVERSITY
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsDATAVERSITY
 

Mais procurados (20)

Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability Models
 
Data Quality Best Practices
Data Quality Best PracticesData Quality Best Practices
Data Quality Best Practices
 
Wallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation RoadmapWallchart - Data Warehouse Documentation Roadmap
Wallchart - Data Warehouse Documentation Roadmap
 
A tailored enterprise architecture maturity model
A tailored enterprise architecture maturity modelA tailored enterprise architecture maturity model
A tailored enterprise architecture maturity model
 
Emerging Trends in Data Architecture – What’s the Next Big Thing
Emerging Trends in Data Architecture – What’s the Next Big ThingEmerging Trends in Data Architecture – What’s the Next Big Thing
Emerging Trends in Data Architecture – What’s the Next Big Thing
 
04. Logical Data Definition template
04. Logical Data Definition template04. Logical Data Definition template
04. Logical Data Definition template
 
Capturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And ReportsCapturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And Reports
 
Building a strong Data Management capability with TOGAF and ArchiMate
Building a strong Data Management capability with TOGAF and ArchiMateBuilding a strong Data Management capability with TOGAF and ArchiMate
Building a strong Data Management capability with TOGAF and ArchiMate
 
SAP BI Requirements Gathering Process
SAP BI Requirements Gathering ProcessSAP BI Requirements Gathering Process
SAP BI Requirements Gathering Process
 
Forget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart DataForget Big Data. It's All About Smart Data
Forget Big Data. It's All About Smart Data
 
White Paper - Data Warehouse Project Management
White Paper - Data Warehouse Project ManagementWhite Paper - Data Warehouse Project Management
White Paper - Data Warehouse Project Management
 
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
 
Strategic Approach To Data Migration Project Plan
Strategic Approach To Data Migration Project PlanStrategic Approach To Data Migration Project Plan
Strategic Approach To Data Migration Project Plan
 
Shadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT ArchitectureShadow IT And The Failure Of IT Architecture
Shadow IT And The Failure Of IT Architecture
 
Enterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureEnterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data Architecture
 
Business Requirement Document
Business Requirement DocumentBusiness Requirement Document
Business Requirement Document
 
Capability Model_Data Governance
Capability Model_Data GovernanceCapability Model_Data Governance
Capability Model_Data Governance
 
Implementing the Data Maturity Model (DMM)
Implementing the Data Maturity Model (DMM)Implementing the Data Maturity Model (DMM)
Implementing the Data Maturity Model (DMM)
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
TOGAF 9 Architectural Artifacts
TOGAF 9  Architectural ArtifactsTOGAF 9  Architectural Artifacts
TOGAF 9 Architectural Artifacts
 

Semelhante a Capturing Data Requirements

Effectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB ImplementationEffectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB ImplementationAntonio Rolle
 
1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docx1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docxdrennanmicah
 
Blank Paper To Write On
Blank Paper To Write OnBlank Paper To Write On
Blank Paper To Write OnKayla Miller
 
Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015Olivier Béghain
 
Overview of business intelligence
Overview of business intelligenceOverview of business intelligence
Overview of business intelligenceAhsan Kabir
 
Complexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP EnvironmentComplexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP Environmenteprentise
 
IPM Individual Assignment.docx
IPM Individual Assignment.docxIPM Individual Assignment.docx
IPM Individual Assignment.docxMikealay Desta
 
Master Data Management methodology
Master Data Management methodologyMaster Data Management methodology
Master Data Management methodologyDatabase Architechs
 
Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)Maria Pulsoni-Cicio
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - finalAndrew White
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture Hamzazafeer
 
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryAge of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryInside Analysis
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015Mark S. Mahre
 
College management
College managementCollege management
College managementanandhan30
 
Bhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodologyBhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodologyBhawani N Prasad
 
Integrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s GuideIntegrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s GuideSalesforce.org
 
Concurrency Technology Roadmap
Concurrency Technology Roadmap Concurrency Technology Roadmap
Concurrency Technology Roadmap Concurrency, Inc.
 

Semelhante a Capturing Data Requirements (20)

Effectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB ImplementationEffectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB Implementation
 
Acc 340 Preview Full Course
Acc 340 Preview Full CourseAcc 340 Preview Full Course
Acc 340 Preview Full Course
 
1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docx1RUNNING HEAD Normalization2NormalizationNORM.docx
1RUNNING HEAD Normalization2NormalizationNORM.docx
 
Acc 340 Preview Full Course
Acc 340 Preview Full Course Acc 340 Preview Full Course
Acc 340 Preview Full Course
 
Blank Paper To Write On
Blank Paper To Write OnBlank Paper To Write On
Blank Paper To Write On
 
Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015Workshop on requirements and modeling at HAE 2015
Workshop on requirements and modeling at HAE 2015
 
Data analyst
Data analystData analyst
Data analyst
 
Overview of business intelligence
Overview of business intelligenceOverview of business intelligence
Overview of business intelligence
 
Complexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP EnvironmentComplexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP Environment
 
IPM Individual Assignment.docx
IPM Individual Assignment.docxIPM Individual Assignment.docx
IPM Individual Assignment.docx
 
Master Data Management methodology
Master Data Management methodologyMaster Data Management methodology
Master Data Management methodology
 
Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)Master data management executive mdm buy in business case (2)
Master data management executive mdm buy in business case (2)
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture
 
Age of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide DiscoveryAge of Exploration: How to Achieve Enterprise-Wide Discovery
Age of Exploration: How to Achieve Enterprise-Wide Discovery
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
 
College management
College managementCollege management
College management
 
Bhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodologyBhawani prasad mdm-cdh-methodology
Bhawani prasad mdm-cdh-methodology
 
Integrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s GuideIntegrating SIS’s with Salesforce: An Accidental Integrator’s Guide
Integrating SIS’s with Salesforce: An Accidental Integrator’s Guide
 
Concurrency Technology Roadmap
Concurrency Technology Roadmap Concurrency Technology Roadmap
Concurrency Technology Roadmap
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Capturing Data Requirements

  • 1. CAPTURING DATA REQUIREMENTS Best Practices in requirements gathering for data rich projects. Presented by: Greg Bhatia (Chief Instructor, MCOM IT Training) Visit us on the web at www.mcomtraining.com
  • 2.
  • 3.
  • 4.
  • 5. The Top down requirements process The Fabled Requirements Tree
  • 6. The Top down requirements process In Reality: The Requirements Tree Stakeholder Request Functional Non Functional Constraints
  • 7. The Top down requirements process Stakeholder Request Functional Non Functional Constraints Use Cases Accessibility Performance …… Software Specifications Software Specifications
  • 8. The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
  • 9. The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data
  • 10. The Top down requirements process Maintaining Traceability Stakeholder Request Functional Non Functional Constraints Use Cases Misc. NF Data 1:1 1:1 1:1 1:1 1:1 1:n n:1
  • 11. Use cases are useful but…
  • 12.
  • 13.
  • 14. Use cases are useful but… Stakeholder Intent Development Possibilities [Name], [Email], [Phone], [Address 1],[Address 2], [City], [Province], [Postal Code] [First Name], [Last Name], [Email], [Phone], [ Address 1], [Address 2 ], [City], [Province], [Postal Code] [Name], [Email], [Phone], [Address], [City], [Province], [Postal Code] #1 Best case Scenario #2 Scenario #3 Scenario Application captures data in the following format: [First Name], [Last Name], [Email], [Phone], [Address 1], [Address 2], [City], [Province], [Postal Code]
  • 15.
  • 16.
  • 17. Data, looking beyond the bits & bytes
  • 18. Data, looking beyond the bits & bytes What is Data? The layman’s definition (1) Distinct pieces of information, usually formatted in a special way. All software is divided into two general categories: data and programs. Programs are collections of instructions for manipulating data. Strictly speaking, data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word. (2) The term data is often used to distinguish binary machine-readable information from textual human-readable information. For example, some applications make a distinction between data files (files that contain binary data) and text files (files that contain ASCII data). (3) In database management systems, data files are the files that store the database information, whereas other files, such as index files and data dictionaries, store administrative information, known as metadata.
  • 19. Data, looking beyond the bits & bytes What is Data? The Business Analyst’s definition A collection of facts that have been organized and categorized for a pre determined purpose from which conclusions may be drawn;
  • 20. Data, looking beyond the bits & bytes There is Rich And then there is Data Rich
  • 21. Data, looking beyond the bits & bytes Settle on the best plan, exploit the dynamic within, develop it without. Follow the advantage, and master opportunity General Sun Tzu from The Art of War 6th century BC
  • 22. Data, looking beyond the bits & bytes Every Data Requirement discussion is an opportunity to enhance the BI capability (current of future) of the organization There is never a better time to have BI focused discussions than when requirements for the data capture systems are being reviewed
  • 23.
  • 24. Data, looking beyond the bits & bytes [Annual Income] + [Gender]+ [Marital Status] = Predictive Modeling / Data Mining [Language Preference] = Targeted CRM Campaigns PROJECT R.O.I
  • 26. Why Plan for BI? Why Do Organizations need Business Intelligence capabilities? Running a business costs money and so organizations need to maximize their revenue . This optimization can only be achieved through insight and it is this insight that is the key benefit a BI solution delivers to an organization B.I Components Analysis Data Warehouse OLAP Cubes Predictive Models Reporting Ad-hoc reports Balanced Scorecards Dashboards
  • 27. Why Plan for BI? You can plan ahead, or you can play catch-up BI is the Future, not an after thought
  • 28. Why Plan for BI? It Costs time & effort to plan for BI in every development initiative * This is an investment * It Costs money to re-configure a system to make It “BI friendly “ * This is a sunk cost * … and you still don’t get the full benefit of a BI solution due to missing Historical data
  • 29.
  • 30. Data discovery – Ask and ye shall receive…
  • 31. Data discovery – Ask and ye shall receive… One of the biggest challenges facing IT organizations is pinpointing the location of critical data throughout the enterprise. A lot of time is wasted in trying to identify data sources, owners and data capture strategies, time which is better spent in Requirements Analysis Delaying the data discovery phase only makes the problem worse
  • 32.
  • 33.
  • 34.
  • 35. Data discovery – Ask and ye shall receive… Asking the right questions to the right people is equally important Question: Is the data refreshed on a daily basis or weekly basis? Qualified Audience: Data owner, Data SME Question: We need to build an automated ETL pipe from this data source into our application. What would be the cost & timelines? Qualified Audience: Data owner, Question: What fields need to be captured in the data feed? Qualified Audience: Business SME / Stakeholder / BI Champion Question: At what grain should we capture the data? Qualified Audience: BI Champion
  • 36.
  • 37. Thank You for Attending For all your Individual & Corporate Training Needs Visit us on the web at www.mcomtraining.com