Topics
- Requirements Management
- Use cases concepts
- Mobile Application Development Strategies
- Mobile Device Management
- Device Capabilities
- Usability
- Network Connectivity
- Permissions
- Device Security
- Best Practices for Mobile Requirements
Audience
This course is intended for everyone involved in the requirements gathering aspect of a software project. This includes System and Business Analysts, Managers, Information Developers, Software Designers, QA Professionals, and Sales and Marketing.
Prerequisites
None.
Duration
2 days
Outline for Introduction to Requirement Gathering for Mobile Applications Training
Chapter 1 - Introduction to Requirements
- What is a Requirement?
- Types of Requirements
- Important Requirement Concepts
- Quality
- Requirement Levels
- What is Requirements Management
- The Cost of Requirement Errors
- A Game Plan for Building Quality Software
- The Rational Unified Process
- Inception Phase
- Refine the System Definition
- Examples
- Elaboration Phase
- Example Use Case Diagram
- Construction Phase
- Software Development Life Cycle with RUP
- A Requirements Capture Workflow
- Step 1. Analyze the Problem
- Step 2. Understand User Needs
- Step 3. Define the System
- Step 4. Manage the Scope
- Step 5. Refine the System Definition
- Step 6. Manage Changing Requirements
- Summary
Chapter 2 - Use Cases
- Use Cases
- Benefits of Use Cases
- Classifying Use Cases
- Levels of Use Cases
- Prefer User Goal Level
- Use Case Modeling
- Use Case Modeling Steps
- Step 1 – Scope
- In/Out Matrix to Determine Scope
- Step 2 – Actors
- Actor Notation
- Finding Actors
- Finding Actors – continued
- Step 3 – Goal List
- Step 4 & 5 – Finding Use Case
- Section of a Use Case
- Documenting Use Cases
- Use Case notation
- Action Sequence
- Use Case Relationships
- Use Case Relationships
- Limitations
- Summary
Chapter 3 - Mobile Application Development Strategies
- Mobile Applications
- Devices Types
- Smartphones
- Tablets
- Device Convergence
- Platforms
- Platform Comparison
- Bring Your Own Device (BYOD)
- The Reality
- Types of Mobile Applications
- Native Mobile Applications
- Mobile Web Applications
- Responsive Web Design
- Building Responsive Web Applications
- Hybrid Mobile Applications
- The Future?
- HTML5 — 9 New Features
- Cascading Style Sheets — CSS
- JavaScript
- Libraries
- Common Features
- Mobile Web Development
- Apache Cordova (PhoneGap)
- Building with Cordova
- 10 Questions
- Summary
Chapter 4 - Mobile Device Management
- The Need for Mobile Device Management (MDM)
- MDM in Customer Facing Applications
- Mobile Device Policy for Internal Apps
- Mobile Device Policy Considerations
- MDM in Internal Applications
- Bring Your Own Device
- Commercial MDM Solutions
- 10 Questions
- Summary
Chapter 5 - Device Capabilities
- Mobile Evolution
- Form Factors
- Screen Sizes
- Example: Master-Detail on a Phone
- Example: Master-Detail on a Tablet
- Input Mechanisms
- Requirements Related to Input
- Sensors
- Requirements Relating to Sensors
- Radios
- Near Field Communications (NFC)
- The Battery
- Battery Requirements
- Functional and Non Functional Requirements
- 10 Questions
- Summary
Chapter 6 - Mobile Usability Patterns
- Introduction
- Usage Pattern Based UI Design
- Tabbed Interface Pattern
- Tabbed Interface in Android
- Vertically Scrollable List Pattern
- Master Detail Navigation Pattern
- Example Navigation
- Split View Pattern
- Device Dimension Specific UI Pattern
- Handling Orientation Change
- Toolbar Pattern
- Search Interface Pattern
- Pagination Pattern
- Detail Iteration Pattern
- Loading Images from the Internet
- 10 Questions
- Summary
Chapter 7 - Mobile Connectivity Requirements
- Mobile Device Connectivity
- Types of Connections
- Reversing a Trend
- Cellular
- Wifi
- Bluetooth
- Near Field Communications (NFC)
- NFC Tags
- Varying Connection Quality
- Connection Costs
- Data Transfer
- SOAP Web Services
- RESTful Web Services
- Websockets
- Offline Strategies
- No Offline Operations
- Limited Offline Operations
- Full Capability Offline
- 10 Questions
- Summary
Chapter 8 - Mobile Security Requirements
- 5 Aspects of Security
- Too Much Security?
- Security is a Business Decision
- Security is Security
- Transport Layer Security (TLS)
- How TLS Works
- Mobile Security Challenges
- Physical Device Security
- Lack of User Accounts
- Data Entry Challenges
- No Device Password
- Data at Rest
- App Permissions Android
- App Permission iOS
- Android App Permissions – A Cautionary Tale
- A Cautionary Tale Conclusion
- Radios
- Emerging Mobile Security Solutions
- Biometrics
- Two-factor Authentication
- NFC Tokens
- LoJack®
- 10 Questions
- Summary
Chapter 9 - Mobile Requirements Best Practices
- Mobile Requirements Best Practices
- Requirements Gathering is an Iterative Process
- Requirements Should be SMART
- Specific
- Measurable
- Achievable
- Relevant
- Time-Bound
- Subject Matter Experts Drive Requirements
- Start with the functional requirements
- Use UI prototypes
- Mobile apps have unique non-functional requirements
- Summary