Sunday, May 17, 2015

Business Analysis Webinars for May 2015 - Part II

How to Elaborate Requirements Through Use Cases and User Stories
Presented by Dr. Martin Schedlbauer, Ph.D., CBAP, OCUP, Consultant and Senior Instructor for Corporate Education Group

Use cases and user stories are both excellent techniques for understanding what a user needs from a product. While both have a similar purpose, use cases and user stories are not meant to be used interchangeably. That is why it’s important for a business analyst to understand the difference.

The older of the two techniques is the use case, which captures usage scenarios. In other words, a use case documents how an individual uses a product to accomplish something of value. This technique works well for projects where functional requirements and usage scenarios must be – and can be – specified upfront. However, what if you can't know the requirements upfront?

In a user story, the user and what they need the product to accomplish is also specified, but in contrast to use cases, at a much higher level.

Recognizing which technique is best suited to your situation is the key.

In this webinar you will learn to:

·         Determine when to apply use cases and user stories to define stakeholder requirements.
·         Elaborate use cases through scenarios.
·         Augment use cases and user stories with diagrams and visuals for better communication

Audience: Public
Date/Time: Tuesday, May 19, 2015; 1:00 pm – 2:00 pm EDT
Host: Corporate Education Group    @CorpEdGroup
Cost: Free
Registration:   Corporate Education Group Webinar Registration


 
 
 
Partner Evoke is Breaking Bottlenecks for Better Customer Service with BPM
Presented by Bonitasoft BPM

Businesses everywhere today are expected to offer world-class customer service with higher reliability and greater agility than ever before. Business process management solutions can provide a solid foundation for superior customer service, and the success of these solutions depends on how quickly they can find and remove process bottlenecks.

In this webinar, we will be sharing the results of our recent experience implementing a BPM solution that executes end user information updates at customer. We will also explain generally how Bonita BPM helps to manage complexities in a business process.

Some of the causes of bottlenecks in the existing business process, before we implemented Bonita BPM:

·         A massive amount of data had to be handled – roughly a hundred thousand customer records to be managed for updates.
·         Process progress was managed using Microsoft Excel spreadsheets.
·         Manual interaction with multiple applications was needed to complete some process steps.
      ·         Low process throughput, and insufficient visibility into the process

We will explain how Bonita BPM implementation resulted in the following tangible benefits:

·         Vastly enhanced process efficiency and visibility
·         Fewer failures after automation of manual procedures
·         Improved customer engagement
·         Optimized and enhanced business process

Join us for this webinar and see how customer tackled some tough bottlenecks to improve their customers’ satisfaction!

Audience: Public
Date/Time: Tuesday, May 19, 2015; 1:00 – 2:00 pm EDT
Host: Bonitasoft BPM    @bonitasoft
Cost: Free
Registration:   Bonitasoft BPM Webinar Registration

 


 

Blueprint Systems Live Product Demonstration
Presented by Blueprint Systems

Accelerate projects and deliver more business value

Join us for a live, interactive demonstration of Blueprint, a visually driven requirements platform that resolves many of the time-consuming, costly, and error- prone functions, thus ensuring that mission critical projects are completed successfully, on time and on budget.

Blueprint helps:

        Deliver applications that meet business expectations;
        Increase standardization, consistency and reuse;
        Improve visibility and accountability;
        Improve application quality;
        Reduce costs.

Offering seamless integration with application lifecycle management tools, Blueprint works with different development methodologies, including Agile and Waterfall.

Audience: Public
Date/Time: Wednesday, May 20, 2015; 11:00 am – 12:00 pm EDT
Host: Blueprint Systems   @Blueprintsys
Cost: Free
Registration:   Blueprint Systems Live Product Demonstration Registration

 
 

The Use Case Technique: An Overview
Presented by Karl Wiegers, Principal Consultant, Process Impact

Use cases are an effective and widely used technique for eliciting software requirements. The usage-centric approach focuses on the goals that users have with a system, rather than emphasizing system functionality. This webinar presents an overview of the use-case approach to requirements elicitation in a practical and straightforward fashion. 

Topics covered include:

·         Where use cases fit into the requirements development process
·         Types of projects for which use cases are and are not well suited
·         Use cases and user stories
·         User classes and actors
·         Scenarios and use cases
·         Components of a use case
·         Deriving functional requirements from use cases 

Audience: Public
Date/Time: Wednesday, May 20, 2015; 12:00 pm – 1:00 pm EDT
Host: Modern Analyst    @ModernAnalyst
Cost: Free
Registration:   Modern Analyst Webinar Registration
 

 
 

Agile Planning for Success
Presented by Rick Clare, PMP, CBAP, CSM, MSPM

One of the many myths about Agile is that it needs little planning. This webinar will discuss how to effectively do the five levels of Agile planning: product vision, product roadmap, release planning, iteration planning and daily planning. Attend this webinar and learn how planning is done on Agile projects.
 
Audience: Public
Date/Time:  Thursday, May 21, 2015; 12:00 pm – 1:00 pm EDT
Host: PM Centers USA    @PMCentersUSA
Cost: $14.95
Registration:   PM Centers USA Public Webinar Registration

 

 

6 Steps to Effective Vulnerability Response
Presented by Stephen Coty, Chief Security Evangelist at Alert Logic

GHOST, Shellshock, Heartbleed and POODLE are just some of the vulnerabilities identified recently - and the outlook going forward is no better. Systems, networks, and applications will continue to be susceptible to vulnerabilities, so it is important to be prepared for response when a vulnerability is identified. How can you be more prepared to respond when a vulnerability is identified? Join this webinar to get practical advice on responding to the next vulnerability as Alert Logic Chief Security Evangelist will walk through walk through these six core steps

·         Researching the Vulnerability
·         Determining Exposure
·         Defining a Communications Plan
·         Creating Security Content
·         Patching the Vulnerability
·         Lessons Learned

Audience: Public
Date/Time: Thursday; May 21, 2015; 1:00 pm – 2:00 pm EDT
Host: Ziff Davis Events    @ZDB2B
Cost: Free
Registration:   Ziff Davis Events Registration

 

 

Motivation: Driving Potential and Performance
Presented by Casey Mitchell, Consultant and Instructor for Corporate Education Group

How do we motivate people? While someone may possess the knowledge, skills, and desire to do great work, he or she needs the opportunity --and the proper environment and support -- to do so. This webinar explores the nature of motivation as a means of unleashing potential and driving organizational success. We’ll discuss external and internal motivation and how each impacts performance. You will learn how to identify what drives an individual to want to do their best work. You will acquire tools and strategies to create and sustain an environment that fosters highly motivated and engaged employees.

This webinar will help you:

·         Discover approaches to motivation that support the complex nature of work today.
·         Explore the nature of external rewards and their effect on performance.
·         Identify key motivation factors; the internal drivers that move people to action.
·         Create the conditions necessary for people to use their full potential.

Audience: Public
Date/Time: Wednesday, May 27, 2015; 1:00 pm – 2:00 pm EDT
Host: Corporate Education Group    @CorpEdGroup
Cost: Free
Registration:   Corporate Education Group Webinar Registration

 

No comments:

Post a Comment