Feeds

Mingling requirements

Requirements management for all

  • alert
  • submit to reddit

Internet Security Threat Report 2014

More moves are in train to bring Requirements Management (RM) out of its fusty corner of esoteric technical argument and into the mainstream of applications development planning.

Indeed, the whole area of Applications Lifecycle Management (ALM) is a hive of activity as new tools start to appear, and the arrival of Mingle, the new tool from ALM consultants, ThoughtWorks, aims to take RM capabilities out of its corner so that non-technical members of development teams can get properly engaged in the process.

Mingle has been specifically designed to help Agile development teams bring new applications to production, providing them with tools to document the development process, track bugs, capture requirements, and link code to requirements.

ThoughtWorks has been using Agile techniques for RM definition work for some time and one of the particular claims the company makes for the need for Mingle is the fact that non-technical, non-developer staff such as business analysts, quality assurance teams, project managers and users of the applications are an important part of any RM team. So it has designed the tool to accommodate their input and foster their involvement and collaboration across the requirements process.

The target, according to the company, is to make the RM process an enjoyable one, because that way teams work better together and produce better quality results.

The company already distributes tools such as RubyWorks and Enterprise CruiseControl, but Mingle is the first tool to come from within the company itself. Development started using Ruby on Rails and JRuby but the development team, centred in Sydney, Australia, finished the job in true ‘eat your own dog-food’ style by using the early development stages of Mingle to develop the rest of the application.

Mingle is available on 30 days trial as a free download, and will remain free to RM project teams of five or less people, as well as for most open source projects. Academic institutions and non-profit-making organisations can also use the tool for no payment. It is available for use on Windows, Macintosh and Unix platforms, and pricing details for RM teams of five or more can be found here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
Apple's OS X Yosemite slurps UNSAVED docs into iCloud
Docs, email contacts... shhhlooop, up it goes
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.