1.1 Document purpose.
This document is used to describe the information required for the business growth and diversification. The information provided is basically the necessities or requirements for the terabyte business to create a repository database system which will be used for collecting and analyzing data. The system should meet the needs of all the organization clients.
1.2 Intended audience.
The target audience of the intended project will involve all possible customers of the organization. Specifically, the system will help the management team in making rational decisions in relation to information collected by the system regarding clients' welfare. The users of the system will have an authentication code and only allowed to access assigned data. This will not be the case for the top management officials.
The intended system was a decision made by the board with an intention of improving the value chain of the terabyte organization. It was the motive of all management team to formulate a strategy of achieving the organization objective of 20 percent growth in every financial period. The system is to provide analyzed information for decision making.
1.4 Purpose of the business requirements.
Terabyte organization intends to venture into various markets, to provide its data collection and analysis services. Since its core business activity is data collection and analysis, a system is needed to make its services effective and efficient. This form the main purpose of the system. The organization is focusing on the integration or the diversification process of its services.
1.5 Goals or objectives to be achieved.
The main goal or objective of the intended system is to attain a credible system that will enable the organization to provide quality services to its clients.
1.6 Benefits/ Rationale.
The system will help the organization raise the confidence level of its services to its clients. This will raise the organization performance level thus profitability.
The main stakeholders who will have access to the system are the management team, and any other authorized personnel, with an authorization from the board members.
1.8 Dependences on the existing system.
The organization has other systems, which are currently used to collect and analyze the data. There will be minimal reliance on the other systems when the new system will be implemented. This is because, the activities done by other systems will be wholly done by the intended data warehouse system.
The main assumption in the system development is that, the intended system will be able to cater for the expansion of activities as the organization grows.
2.0 Requirements scope.
The scope of the system is to make the terabyte organization to move up the value chain. This will be through the provision of credible and quality services to its clients. This intended scope of the system is to stimulate to the organization market venturing to acquire new market areas, with quality services as well as improving the current market status. The system is intended to be cost effective and time saving.
2.1 In scope.
The organization will always operate within the scope. Various measures such as frequent evaluations will be done to ensure that the organization operates within the scope.
2.2 Out of scope.
This is not an intended motive of the organization. In a scenario where organization acts out of scope, remedial measures will be taken in order to make its objectives achieved.
3.0 System functionality.
The system is intended to function as the main data storage or warehouse. All data collected from relevant sources will be recorded and be processed by the system. The processing and analysis of data will be done to make the necessary decisions.
3.1 Actor’s profile specification.
The actors are the external users of the system who interacts with the functionality of the system. System developers will form the main actors of the system and will be required to make necessary changes in the program functionality. The management team will form the secondary actors of the system.
3.2 Essential use case specifications.
The interaction between the system and infrastructure need to made feasible. A system is a set of commands that needs to be executed by the system infrastructure. The organizational infrastructure is made compatible with the system. The information confidentiality is another main concern in any system development. The new data warehouse system has to ensure that all the security of the data is upheld. The use of analytics, cloud technology, and system interfaces will help the terabyte organization to achieve its goals.
3.3 The system function hierarchy diagram.
Data collected will be recorded in the data warehouse. The data will then be authenticated and verified to identify the relevance of the data. Data cleaning and coding will help in removing undesirable elements contained in the data. The data will then be processed, and analysis is done to arrive to a conclusion that will help in report generation. If processed data fail to meet the required decision, further analysis will be done. This is as indicated by the dotted arrow from the report generation stage to the data processing and analysis stage.
3.4 Potential outsourcing and offshoring needs.
The database is an off-shelf program. The program will be designed as per the user's specification. Therefore, the outsourcing of the system developers will be needed as the organization is in its early stages of development. The organization is yet to have in-house system developers. If, within the region, there are no required system developers, the organization will offshore the required expertise from other regions of the world. Therefore, the outsourcing or the off-shoring of the required expertise forms a basic requirement for the development of the system.
4.0 Non functional requirements.
The development of the system must coincide with the requirements of the regulation put in place by the governing authority. These include the legislative procedures and social welfare consideration. The organization should develop a system that takes into account the economic aspect of the country. The organization should comply with the state rules regarding the conduct of its activities in relation to the system.
4.1 Security requirements.
In the recent world economy, there is a massive development in information technology. This poses a threat to the organization mode of operation in regard to the new system. The organization should provide an elaborate measure such as the use of data encryptions and passwords to protect its collected data from vulnerabilities. This will help the organization improve the information security level of its clients' organization.
The programs should be designed to run authentication code requirement when a user logs in. This reduces instances of data vulnerability.
Hass, K. B., Wessels, D. J., & Brennan, K. (2007). Getting It Right: Business Requirement Analysis Tools and Techniques (illustrated ed.). Boston: Management Concepts.
Moss, L. T. (2003). Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications (illustrated, reprint ed.). Amsterdam: Addison-Wesley Professional.