当前位置:网站首页>How to do a good job in software system demand research? Seven weapons make it easy for you to do it
How to do a good job in software system demand research? Seven weapons make it easy for you to do it
2022-06-30 18:39:00 【Malauan】
principle : The implementers should play a leading role in the whole project , Take the project in the right direction .
How to find the direction ?
The right direction is mainly explored from the needs of users , seeing the name of a thing one thinks of its function , Is to understand the needs of customers , How to understand , This involves Demand survey 了
- Points for attention in demand research
- Don't fight unprepared battles , That is to do the necessary homework , Understand the user's business process
- Demand research needs to guide users , That is, guide users to put forward requirements in the right way , Discover the hidden needs of users
- Demand research is a good opportunity to instill ideas into users , Demand research is not what most people think of as a single communication process , That is, the user says I listen , But it's not , Demand research is a two-way communication process , When conducting research, you can lose no time to output some views to users 、 knowledge 、 Work plan
- Seven weapons for demand research
- Observation
seeing the name of a thing one thinks of its function , Is to run to the work site , Do not interfere with users , Even communication is superfluous , Just look at your ears and listen
Purpose : Have an intuitive understanding of the user's work , For subsequent 、 Lay the foundation for more in-depth research
difficulty : Think of the whole business process from the work of others , See the doorway
- Experience method
I.e. taking the post , The person in charge of the research works in relevant departments , Be familiar with the job contents while working
- Questionnaire survey
Make a questionnaire , Distribute to relevant personnel to answer questions , Understand the business situation and get the public demand through the answers received
difficulty : Difficult to make questionnaire 、 It is difficult to describe in words 、 High personnel requirements 、 The attitude is not serious
benefits : The larger , The more effective the method , Requirements are clearer
- Interview method ( The most standard 、 Most intuitive 、 The most common )
That is, to get the demand through conversation
Be careful :
To prepare , Understand the basic information of the business , Prepare the interview outline
If the expected time is long , You have to make an appointment with the user
Interviews need clues , An interview is about one or more topics , Follow the logic step by step
- Document analysis method
Documents refer to the paper information presented by Party A , No exaggeration The document is the information system of Party A , The document contains the management idea of the designer
Analysis document Generally, it includes the collection of documents 、 Analyze the flow process 、 Analyze the elements of the field 、 Analyze the filling process 、 Analyze doc logic
Be careful :
Used documents are required
Understand the document flow process, that is, how information is transferred in the management process
Understand each element in the document 、 The logic of each grid
- Report analysis method
The statement is the summary of information made by Party A's personnel 、 analysis
The difference between statements and documents : Fill in the document in the process of work , It is a collection of information 、 Pass on 、 The process of saving
Reports are processed based on existing information , It is a processing of information 、 The process of analysis
Users of reports are generally managers at all levels
Start with : Trigger conditions for generating reports
The data source of the report
Analyze the operation logic of the report
- Demand research meeting method
I.e. meeting to discuss requirements , Party A's high cooperation is required , Be sure to make adequate preparations before starting the meeting , Who is involved in 、 Determination of the subject 、 The agenda of the meeting 、 What problems need to be discussed, etc
Why do we need a high degree of cooperation from Party A , From the perspective of implementers , The efficiency of the research meeting is very high , From the perspective of business personnel , Few bosses support this approach , Because this will delay Party A's making money , After all, who comes to the meeting is so easy to leave their work
边栏推荐
- 「经验」我对用户增长的理解『新用户篇』
- iCloud照片无法上传或同步怎么办?
- AI首席架构师10-AICA-蓝翔 《飞桨框架设计与核心技术》
- Customer relationship CRM management system based on SSH
- Rust 操控大疆可编程无人机 tello
- Optimization of interface display for general kernel upgrade of mobo video management system v3.5.0
- Daily interview 1 question - how to prevent CDN protection from being bypassed
- 电子元器件行业在线采购系统精准匹配采购需求,撬动电子产业数字化发展
- Vulnerability recurrence ----37. Apache unomi Remote Code Execution Vulnerability (cve-2020-13942)
- It's not easy to say I love you | use the minimum web API to upload files
猜你喜欢

基于eNSP的校园网设计的仿真模拟

Deep understanding of JVM (V) - garbage collection (II)

基於SSH的網上商城設計

What if icloud photos cannot be uploaded or synchronized?

Daily interview 1 question - how to prevent CDN protection from being bypassed

AI首席架构师10-AICA-蓝翔 《飞桨框架设计与核心技术》

How to solve the lock-in read-only alarm of AutoCAD Chinese language?

Redis (II) -- persistence

清华只能排第3?2022软科中国大学AI专业排名发布

Redis (VIII) - enterprise level solution (I)
随机推荐
Apple Watch无法开机怎么办?苹果手表不能开机解决方法!
Type ~ storage ~ variable in C #
Redis (VI) - master-slave replication
Advanced customization of uni app [day13]
先写API文档还是先写代码?
Compilation problems and solutions of teamtalk winclient
News management system based on SSM
Tsinghua only ranks third? 2022 release of AI major ranking of Chinese Universities of soft science
漏洞复现----38、ThinkPHP5 5.0.23 远程代码执行漏洞
「经验」我对用户增长的理解『新用户篇』
Talk about the SQL server version of DTM sub transaction barrier function
Vulnerability recurrence ----37. Apache unomi Remote Code Execution Vulnerability (cve-2020-13942)
清华只能排第3?2022软科中国大学AI专业排名发布
云安全日报220630:IBM数据保护平台发现执行任意代码漏洞,需要尽快升级
LeetCode之合并二叉树
Openlayers 卷帘地图
[software testing] basic knowledge of software testing you need to know
Sword finger offer 16 Integer power of numeric value
LeetCode动态规划经典题(一)
Rust 书籍资料 - 芽之家书馆