Comprehensive software reviews to make better IT decisions
Can Your Organization Afford Phones That Crash When Dialing 911? A Lesson in Prioritizing Requirements
Recently, reports of some Android-based phones crashing and rebooting when a user dials 911 have surfaced. While OnePlus was the primary target of these reports, similar reports on phones from ASUS, Sony, and even Samsung have surfaced.
First things first: if you are reading this article in the United States, you may not be aware that you can schedule a test call by contacting your local 911 call center via its non-emergency phone number (https://www.911.gov/using911appropriately.html). For our international customers, check with your local telephony expert; in any case, you are advised to confirm that your devices can indeed call emergency services in times of need.
We made an interesting observation that, in Canada – and this is not legal advice – there does not seem to be a legal requirement for cell phone manufacturers to ensure that their cell phones can call 911 without crashing. There is a requirement on the part of the cell phone carriers. If a customer brought his/her own phone to the network (which would be the case for OnePlus 5) and the device failed to dial 911, it is unclear who assumes that liability. Be that as it may, however, it would be much more preferable if all phones can dial 911 when there is a need without concern. It’s a must-have requirement for any phone, not just cell phones.
We advise identifying must-have requirements early on in your projects. Some may originate from the need to comply applicable laws and regulations, some may originate from business needs, or, as in our aforementioned example, some may originate from foreseeable risks. Must-have requirements affect every aspect of a project life cycle:
- During project initiation. High-level scope statement in the project charter points out requirements and constraints.
- During project planning. Requirements gathering process captures must-have requirements, which are translated to line items in quality, risk, communication, and stakeholder management plans. Risk owners are identified. In Agile methodology, must-have requirements can be translated into user stories in the project backlog and the product owner must ensure that they are prioritized in order to ensure their delivery.
- During project execution. Project deliverables are monitored, sufficiently tested, and documented for satisfying the compliance requirements. Changes to must-have requirements must also be monitored and responded to with change requests or backlog maintenance.
- During project closure. Ensure a smooth transition to operation by properly transferring the ownership of the risks to the appropriate operational body that owns the project deliverables.
Requirements gathering is one of the 45 core IT processes that Info-Tech supports. We have a blueprint titled “Build a Strong Approach to Business Requirements Gathering,” and a small enterprise blueprint titled “Survive and Thrive with Effective Requirements Gathering.” For guidance on how requirements gathering fits into project management methodologies, check out our blueprints titled “Tailor Project Management Processes to Fit Your Projects” for Waterfall, and “Implement Agile Practices that Work” for Agile.
- Test your phones to ensure it can dial 911 in case of emergencies.
- Examine your project methodology to ensure that must-have requirements are properly researched and the responsibilities identified.
- Use our Build a Strong Approach to Business Requirements Gathering blueprint for a rigorous examination of your existing requirement gathering process.
- Delegate the ownership of risks and quality items for must-have requirements to reliable members within your team.
Capture must-have requirements early through best practices in requirements gathering, and stay on top of meeting them through judicious quality and risk management techniques. During project closure, help your operations staff stay on top of them by transferring the knowledge gained.
Want to Know More?
Build a Business-Driven IT Risk Management Program
Build a Strong Approach to Business Requirements Gathering
My Firewall Is Smarter Than Your Firewall
Next-generation firewalls were smarter than previous firewalls, able to deeply analyze traffic and integrate with complementary security solutions. Today our needs are more complex, however, with a 742% increase in software supply chain attacks over the past three years. Sonatype Nexus Firewall has been paying attention and claims its firewall product is smarter about these attacks.
Your Internet Secret Service, Otherwise Known as External Attack Surface Management (EASM)
Have you ever thought of what else you could do to take your security operations center (SOC) to the next level and focus on prevention? Look no further – external attack surface management (EASM) was a popular managed service and topic of discussion at Rivest–Shamir–Adleman (RSA) Conference 2023, named after a popular public-key cryptosystem.
Can Hillstone Networks Position Its StoneOS to Take Firewalls Beyond the Next Generation?
Hillstone Networks has positioned itself as a robust and feature-rich provider of not only hardware but also security solutions. With its ZTNA 3.0 release and support for centralized management of IoT assets and incident response, the company embodies a next-generation firewall.
Acronis Offers a Unique Endpoint Protection and Data Recovery Package Tailored for the Small to Medium-Sized Business
Acronis hopes to overtake many competitors in the data recovery and endpoint protection solution space by forging partnerships with many MSSPs and appealing to the SMB market. The company has doubled down by hiring the former CEO of GoDaddy, who is committed to reinvesting in its technology and increasing and improving its product line.
Zoho Announces Trident to Power Workplace’s UCaaS Capabilities
Zoho, a multinational software and web-based business tool provider, has announced the launch of Trident – a hub that brings Zoho’s pre-existing and new unified communications capabilities into a single pane of glass. How will Trident’s addition to Workplace impact customer migrations from Microsoft and Google.
Next-Gen EDR/MDR/XDR – Field Effect Covalence
Field Effect Covalence is an EDR/MDR/XDR offering that translates chaos into order.
Will Avaya’s Five-Step Transformation Strategy Generate a Stronger Outlook for 2023?
To revitalize and strengthen business transformation, Avaya has outlined a five-step plan for restructuring its product lines, go-to-market strategy, and balance sheet. This tech note evaluates these five steps, highlighting the main contingencies for each step’s successful rollout.
Informatica World 2022 Highlights
On May 24-25, Informatica held its annual conference in Las Vegas – the first time “in-person” since the beginning of the COVID-19 pandemic.
Are You In or Out? How to Source Application Development
Custom application development is a strategic differentiator in the digital economy. Organizations need to make good decisions on how to insource or outsource that development or they risk bad software … and worse results.