Skip to main content

Back to Basics and a Look to the Future

PW08Crowd_300x139.png

9:50 AM
Wednesday, April 16th, 2008

ProjectWorld * BusinessAnalystWorld
Toronto 2008

Thank you for being part of this!

To view a slideshow of photos from the 2008 Toronto event, click here.

It’s been a hectic couple of weeks with ProjectWorld * BusinessAnalystWorld in Toronto in mid-April and Project Summit & BusinessAnalystWorld in Philadelphia this week. But it has been an enjoyable couple of weeks meeting new and old associates, hearing great speakers and being exposed to exciting new ideas.

And we have another exciting Business Analyst Times for you. Glenn Brûlé continues his Back to Basic series with episode two, Second Fundamental: Creating a Common Vocabulary, in which he discusses the old bugbear – communication and the positive or negative impact it can have on the project. Robert Wysocki wonders if it might be worth considering merging the BA and PM functions into one. Always sure to make people sit up, he puts forward his ideas in Is it Time for the BA and the PM to Get Hitched? Sandra Lavoy looks at what it takes to retain good IT people and Natasha Terk revisits the subject of e-mail with Ten Tips for Writing Effective E-mail Messages.

Our bloggers are back in fine form with their distinctive views – and not always agreeing! Check them out and take sides or sit on the fence. Either way, let us know what you think.

Best Regards, 

Adam R. Kahn
Publisher, Business Analyst Times
[email protected]

The Eye of the Storm: The Business Case

You may have noticed that one theme in this blog is change management, which I think must be central to a BA’s approach to managing requirements. Actually, I take that back…. To some degree, it seems that there is an overemphasis on the requirements themselves, at the expense of managing the business case for satisfying those requirements.

I will try to state my concern philosophically first, by asking the question “Where does the BA stand? What ought to be the BA’s primary point of view?” Here are the stands I see taken by BAs, to varying degrees: 

  • The requirements themselves – extremely challenging to set one’s bearings on the requirements themselves, because they will change! 
  • The requirements process – obviously a more stable view, giving one the prism through which to view and manage the constantly changing requirements 
  • The business case itself – this is the most advantageous point of view from which the BA should start his or her day

Saying it another way, if my mission is to manage the requirements, I could lose sight of the business case itself, which will change as requirements and solution elements (scope, schedule, cost) change. But if my mission is to keep the business case alive and fresh, by continually reflecting within the business case, in business case terms (benefits, costs, risks), the changes to requirements and solution elements, I have not only (a) taken a stand that puts me closest to my stakeholders from a business benefit point of view but also (b) made change management my core activity, because the business case cannot be kept fresh without it.

Do you agree? How central is continuous business case management to the way you work? If it is not central, what are the obstacles/challenges you face in making it so?

Congratulations and Condemnation!

Congratulations to John Dean for his analysis of what to do with a nearly infinite list of specific identity transactions (see March 2nd blog for the list, and John’s April blog for his ideas). 

Improve on it if you can, but I like his idea of grouping identity transactions by the “certainty” required, and using known technologies (Human Chip Insertion, Fingerprints, DNA, Retina prints, id cards) to “produce” the needed certainty.  Each “identifier” stakeholder can simply select the level of certainty they require from such a system.  This is a huge simplification, and seems to be a doable analysis.  There is evidence for the accuracy of many tests, AND we will have to consider the usual 4-D time/space complications (DNA is reliable, and is easy to plant at a crime scene).

Condemnation upon John for his focus on the “identifier” stakeholder, instead of “we the identified”, who live on the other side of such transactions (mostly). 

Leaving out the identified in these analyses is (increasingly) the cause of problems like identity theft, loss of privacy, deprivation of due process (sure, you can fix your erroneous credit record – have fun with your new full-time hobby), erosion of civil rights, and much, much more (the teen suicide who was berated on-line by the adult mother of another teen?).

Leaving us out of the requirements gives John access to a seemingly EASY solution – “chip insertion”.  The risk of crooks “stealing” someone else’s chip for illegal purposes can be dealt with by rigging the chips to self-destruct if removed or fiddled with.  I leave the problem of “counterfeit” chips for a later discussion (solution, as usual, is premature,so nyah, nyah, nyah, Mr. Dean).

This kind of solution is especially tempting for management, in spite of being clearly odious to the “workers. 

The day is coming where, if you are a convicted drug user, or a crummy boyfriend, or a whistleblower, or just a cranky person, people will be able to single you out electronically – even treat you the way we treat convicted pedophiles, just by accessing your history based on your chip id. 

Convicted pedophiles and other sexual criminals already know what this is like – no chance to really start over, always labeled.  The process created by the “identifiers” is great for labeling one for life; not so great for allowing for change and forgiveness. 

The current system protects the interests of the “identifier” stakeholders (John, language is important – can we just call them fascists?).  It assumes recidivism, and does not measure rehabilitation.  Remember – Civil Liberties are not just for people that you like.

One can claim that measuring rehabilitation is a different problem from identification.  Unlike John Dean, my perceptive readers immediately realize that if we can’t measure rehabilitation, then crime, or any “unapproved behavior” becomes a life sentence in the system John advocates.  Do you really want the letter L tattooed on your forehead for life, just because you once littered?

We’ll deal with such “identifier” requirements next time.  In the meantime, as a proof of concept for John’s analysis approach, would you agree with the following estimates of how much certainty is currently required for the following identity transactions?.

Amount of certitude required to identify:

  1. A terrorist = 0.1% (if we harass 1,000 people to actually catch one terrorist, we are satisfied – witness Guantanamo).
  2. Oneself for a driver’s license = 10% (or commerce will shut down – i.e., it is easy to fake the id required)
  3. Oneself to buy coffee and donuts = 95.0% (5% of transactions are “fraudulent”?)
  4. A death penalty convict = 70% (30% of death row inmates may not belong there, the states’ “management” are not investigating their own mistakes, of course). 
  5. A safe sex partner (varies by individual from 99.5% for those who want to witness your HIV test in person, no cheating, to 0% for Larry Craig, Senator from Idaho, who would prefer to know nothing about anyone next to him in a bathroom stall).

I finish with an important success point – small teams.  I want to make the point that our two person “team” (John Dean and myself) is (so far) enormously productive.

In perhaps 20 total person hours of actual focused, asynchronous but responsive work, we have enough grip on the scope to already despair of the sheer scope of the problem – this is good progress!

Next month (unless John tees me off again) we will contrast John’s “certainty” requirements with the requirements that “we the identified” might want to add.

Stay tuned – if we get the requirements right, it may only take one generation to finish this, and none to soon!

The Perils of Poorly Written E-Mail

Poorly written e-mail can sabotage careers, threaten productivity, and negatively affect a company’s image, while effective e-mail increases productivity and improves the workplace environment. It is an important skill that helps people advance their careers and keeps businesses competitive.

E-mail has become the primary method of business communication, surpassing the telephone as our preferred communication tool in the workplace (Datamonitor report, September 2007). While most people already sense that this is the case, we often don’t stop to consider the implications for our careers. It’s time for employers and employees to face the reality that e-mail writing skills could make or break a career. While most of us understand that poorly written e-mail can waste time, we forget that poorly written e-mail can also create costly misunderstandings, catapult deadlines, delay deliverables, impact people’s opinion of you, and sabotage your career.

Employers should also take note: A Write It Well survey found that more than half of American workers spend a third of their day reading and responding to e-mail and nearly 75 percent said that they could make better use of that time.  Wasted time affects a company’s overall productivity and financial statements and in today’s increasingly global economy, companies rely on e-mail to allow large teams across various time zones to work together efficiently on projects. When extreme time differences are combined with various languages, poorly written e-mail can be detrimental to a project’s results and deteriorate team dynamics, both of which directly affect a company’s bottom line. Poorly written e-mail can also affect a company’s public image. In a recent Write It Well survey, a whopping eighty-eight percent of respondents said that badly written e-mail leaves a poor impression of not only the writer, but the writer’s organization as well.

In addition to image, productivity and financial problems, poorly written e-mail can have serious legal implications. IT security and control firm, Sophos, recently found that seventy percent of businesses are concerned about data leakage via e-mail, and fifty percent of employees have sent e-mail with sensitive information to the wrong person causing corporate embarrassment, compliance breaches, and the loss of business-critical information. Whether by accident or because they didn’t think carefully, people send inappropriate and damaging e-mail everyday.  “In high stakes business litigation, the first place I look for smoking gun evidence that may win (or lose) the case is the e-mail server,” said Jonathan W. Hughes, a director of the San Francisco law firm Howard Rice Nemerovski Canady Falk & Rabkin. 

Even with so much at stake, more professionals are entering the workforce without the ability to express themselves clearly in writing. According to The National Commission on Writing for America’s Families, Schools, and Colleges, schools and colleges today neglect writing and, as a result, many college graduates enter the workforce with poor writing skills. Yet, writing is a fundamental business skill. In fact, a recent survey by the Commission found that half of all companies assess writing skills during the hiring process and when making promotion decisions.

The solution is for companies to invest in business writing skills – and specifically, e-mail writing. E-mail writing is a specific skill that needs to be learned explains Terk. Our book, E-Mail – A Write It Well Guide, is a training tool designed to improve the reader’s e-mail writing skills in a very practical way. With a six-step writing plan and a focus on job relevance, readers are rewarded with immediate results. Designed for use by individuals, teams, or as part of classroom training, E-Mail – A Write It Well Guide is cost-effective and flexible.  A facilitator guide allows trainers, managers, and team leaders to lead their own e-mail workshop, and customized training programs are also available.  


Natasha Terk is President of Write It Well, a training and consulting company that helps people in the workplace communicate clearly and work together effectively. Write It Well offers step-by-step techniques to improve business writing through onsite and online training courses, as well as business writing books with companion facilitator guides. E-Mail – A Write It Well Guide, ISBN 978-0-9637455-9-0, is now available at amazon.com and bookstores nation-wide for $21.99.  Visit http://www.writeitwell.com/ for more information about Write It Well’s books, on-site training, and facilitator guides. 

Failing to Plan is Planning to Fail

There is a popular adage often attributed to Benjamin Franklin, the father of time management, “Failing to plan is planning to fail,” The quote may sound like music to your ears but planning for business analysis work is a key area which tries to zero in on the importance of planning in a software development project. Sadly, it is a step that is often overlooked.

The absence of proper planning can detrimentally affect timely meeting of the on-going project deliverables. To avoid such a failure it is vital that a project manager ensure that the requirement planning activity is given due importance, so that everything is under complete control.

So, how can a project manager ensure that a business analyst (BA) is given the power of execution to get the things delivered with the required level of quality and within the defined time frames. Let’s examine some of the key pointers essential to effective business analysis planning.

The Planning Stage

The planning stage gives a high level understanding of the intended software product. It gives the project team a pulse of the current systems and processes, while evaluating the existing deficiencies and identifying the key objectives that need to be addressed in the proposed software development activity.

The planning stage also helps the stakeholders identify the risks that may be associated with the project. Over time, the business requirements keep growing in an attempt to enhance the existing functionality. The objective of the planning stage is to make it absolutely clear – working in partnership with the client and the development teams – what full range of functions and content will be addressed.

The Kick-off Meeting

The kick-off meeting is the opening play of the project. It is an ideal occasion for the project team and the client to introduce them selves and set the project expectations and milestones. The meeting should identify the team roles across the entire spectrum of project related activities, in order to ensure that these activities get completed smoothly.

Requirements Tools and Templates

The business analyst analyses, documents, manages and presents the project requirements for review and approval to the client in a comprehensible manner. As part of the planning process, and early in the project, the BA should communicate to the customer the standard templates and requirement management tools they will adhere to, in order to document the requirements specifications.

For projects large in size and complexity, it is important to make use of requirements management tools to manage version change, track requirement status, communicate with stakeholders and reuse the requirements wherever possible.

Define Points of Contact and Escalation Hierarchy

Should there be any queries or concerns regarding any aspect of the planned project activity, it is important to define a clear process to identify the key points of contact in the project engagement with proper escalation mechanism.

The steering committee is responsible for advice on strategic direction, overseeing planning and implementation, resolving open issues, achieving the project deliverables and milestones, and for preparing a weekly project status report giving updated and accurate information as the project progresses.

The Requirements Sign-off: A Project Milestone

It is imperative that every project participant understand what the Requirements Sign-off means, and its associated impact on the project. Clients should not dismiss sign-off as meaningless, but rather consider it as an important project milestone.

Requirements sign-off means a formal agreement with the project stakeholders, stating that the contents of the requirements document, as drafted, are complete to the final projections and that there are no open issues left to be addressed.

Obtaining a requirements sign-off is typically the final task within the framework of Requirements Communication, which is an expression of the output of requirements gathering to all those concerned with the project.

Conclusion

A holistic approach is absolutely essential and indispensable for the success of the project. It takes effort to leverage and climb the ladder of success. The journey is indeed rewarding and also a voyage of discovery.


Nilesh A. Raje is a Sr.Consultant (Functional) with SYSTIME Computer Systems Ltd. SYSTIME (www.SYSTIME.net) is a leading global business provider delivering reliable, high-quality, cost-effective IT solutions and services. Nilesh has extensive experience in Business Analysis. He has a Bachelor’s Degree in Engineering and is also pursuing his Master’s in Business Administration. He has also been published earlier with International Institute of Business Analysis, a leading association in the world of business analysis, as well as in a previous issue of Project Times. In 2007, Nilesh represented his country as “The Youth Icon of India” in Brussels at the First CCS World Youth Forum in the European Parliament. Nilesh can be reached at [email protected].