当前位置:网站首页>How to do a good job in software system demand research? Seven weapons make it easy for you to do it
How to do a good job in software system demand research? Seven weapons make it easy for you to do it
2022-06-30 18:39:00 【Malauan】
principle : The implementers should play a leading role in the whole project , Take the project in the right direction .
How to find the direction ?
The right direction is mainly explored from the needs of users , seeing the name of a thing one thinks of its function , Is to understand the needs of customers , How to understand , This involves Demand survey 了
- Points for attention in demand research
- Don't fight unprepared battles , That is to do the necessary homework , Understand the user's business process
- Demand research needs to guide users , That is, guide users to put forward requirements in the right way , Discover the hidden needs of users
- Demand research is a good opportunity to instill ideas into users , Demand research is not what most people think of as a single communication process , That is, the user says I listen , But it's not , Demand research is a two-way communication process , When conducting research, you can lose no time to output some views to users 、 knowledge 、 Work plan
- Seven weapons for demand research
- Observation
seeing the name of a thing one thinks of its function , Is to run to the work site , Do not interfere with users , Even communication is superfluous , Just look at your ears and listen
Purpose : Have an intuitive understanding of the user's work , For subsequent 、 Lay the foundation for more in-depth research
difficulty : Think of the whole business process from the work of others , See the doorway
- Experience method
I.e. taking the post , The person in charge of the research works in relevant departments , Be familiar with the job contents while working
- Questionnaire survey
Make a questionnaire , Distribute to relevant personnel to answer questions , Understand the business situation and get the public demand through the answers received
difficulty : Difficult to make questionnaire 、 It is difficult to describe in words 、 High personnel requirements 、 The attitude is not serious
benefits : The larger , The more effective the method , Requirements are clearer
- Interview method ( The most standard 、 Most intuitive 、 The most common )
That is, to get the demand through conversation
Be careful :
To prepare , Understand the basic information of the business , Prepare the interview outline
If the expected time is long , You have to make an appointment with the user
Interviews need clues , An interview is about one or more topics , Follow the logic step by step
- Document analysis method
Documents refer to the paper information presented by Party A , No exaggeration The document is the information system of Party A , The document contains the management idea of the designer
Analysis document Generally, it includes the collection of documents 、 Analyze the flow process 、 Analyze the elements of the field 、 Analyze the filling process 、 Analyze doc logic
Be careful :
Used documents are required
Understand the document flow process, that is, how information is transferred in the management process
Understand each element in the document 、 The logic of each grid
- Report analysis method
The statement is the summary of information made by Party A's personnel 、 analysis
The difference between statements and documents : Fill in the document in the process of work , It is a collection of information 、 Pass on 、 The process of saving
Reports are processed based on existing information , It is a processing of information 、 The process of analysis
Users of reports are generally managers at all levels
Start with : Trigger conditions for generating reports
The data source of the report
Analyze the operation logic of the report
- Demand research meeting method
I.e. meeting to discuss requirements , Party A's high cooperation is required , Be sure to make adequate preparations before starting the meeting , Who is involved in 、 Determination of the subject 、 The agenda of the meeting 、 What problems need to be discussed, etc
Why do we need a high degree of cooperation from Party A , From the perspective of implementers , The efficiency of the research meeting is very high , From the perspective of business personnel , Few bosses support this approach , Because this will delay Party A's making money , After all, who comes to the meeting is so easy to leave their work
边栏推荐
- Optimization of interface display for general kernel upgrade of mobo video management system v3.5.0
- MySQL advanced - basic index and seven joins
- Communication network electronic billing system based on SSH
- uni-app进阶之内嵌应用【day14】
- LeetCode之合并二叉树
- 这里数据过滤支持啥样的sql语句
- Redis (VIII) - enterprise level solution (I)
- LeetCode动态规划经典题(一)
- Design of online shopping mall based on SSH
- Advanced embedded application of uni app [day14]
猜你喜欢

挑选智能音箱时,首选“智能”还是“音质”?这篇文章给你答案

Design of online shopping mall based on SSH

Oneortwo bugs in "software testing" are small things, but security vulnerabilities are big things. We must pay attention to them

4个技巧告诉你,如何使用SMS促进业务销售?

Php8.0 environment detailed installation tutorial

助力极致体验,火山引擎边缘计算最佳实践

Only black-and-white box test is required for test opening post? No, but also learn performance test

基于SSH的通讯网络电子计费系统

金融服务行业SaaS项目管理系统解决方案,助力企业挖掘更广阔的增长服务空间

Redis (I) - data type
随机推荐
C# Winform程序界面优化实例
MySQL reports that the column timestamp field cannot be null
ASP. Net password encryption and password login
清华只能排第3?2022软科中国大学AI专业排名发布
Only black-and-white box test is required for test opening post? No, but also learn performance test
It's not easy to say I love you | use the minimum web API to upload files
分布式事务
100 examples of bug records of unity development (the first example) -- shader failure or bug after packaging
Vs Code treeview TreeView
Flink系列:checkpoint调优
The secondary menu of the magic article system v5.4.0 supports the optimization of form display
Several points in MySQL that are easy to ignore and forget
uni-app进阶之自定义【day13】
Techo Youth2022学年高校公开课:直播连麦的背后,探索音视频技术如何应用
Research on the principle of Tencent persistence framework mmkv
Deep understanding of JVM (V) - garbage collection (II)
Vulnerability recurrence ----- 35. Uwsgi PHP directory traversal vulnerability (cve-2018-7490)
金融服务行业SaaS项目管理系统解决方案,助力企业挖掘更广阔的增长服务空间
Merged binary tree of leetcode
基于SSH的网上商城设计