Feeds

State of the ALM art

Xeau's Barry Gilbert speaks with David Norfolk

Combat fraud and increase customer satisfaction

Reg Dev: And is any of this necessary, or even feasible, for small companies?

Gilbert: The core questions of who, what, when, why, and how apply regardless of size of company or project team. Do smaller companies need requirements management or an ALM solution? Then, if the answer is yes, do they need a toolset to assist? Well, that depends. Small doesn't mean simple – many a small company run into the complexities of remote development and perhaps outsourced testing. In which case, a cohesive communicative repository of information is essential and that's what requirements management gives them.

Reg Dev: I suppose we should get onto RM tools before we finish. For a start, are tools always necessary? Is there work that users can do on developing/organising the way they run RM planning meetings (perhaps using white boards, a camera and a Wiki) that can make them more effective - without buying (and learning) an RM tool?

Gilbert: The great thing about a tool, if deployed and used correctly, is it promotes discipline. Requirements management can, to a certain degree, be achieved without using a tool; but referring back to the leading requirements management tool – Office – would you truly want to invest the time and effort needed to get it to collect and audit your essential company's needs. Let alone expect it to notify all stakeholders of any changes they may have a stake in. Not to mention, expect to it to produce impact analysis and traceability matrices and be available to all on the web.

Reg Dev: OK, fair enough - is there a single 'best of breed' RM tool?

Gilbert: Not as such, the number of requirements management tools available has broadened significantly in recent years with some of the tools specialising in particular areas of requirements management, for example requirements capture. Our job at Xeau is to marry out knowledge of the marketplace with the needs of our clients to assist them select the right tool for their requirements management needs. As always, solving the requirements management need isn't just about buying a tool; after all a fool with a tool is a "less well off" fool.

Reg Dev: As well as Contour, Xeau has experience with users of Caliber (now with Borland), Steeltrace (now Compuware OptimalTrace, Telelogic Doors and IBM Rational Requisite Pro. How do you distinguish the 'purpose each of these tools is fit for'?

Gilbert: The tools mentioned are exceptionally good and invariably end up on the short list of many potential buyers. To differentiate them here would take too long. But users should look at the maturity of the tools, whether the tool suffers from [the use of] aging technology, what user interfaces are needed, who will actually use the tool and in what context, what integrations are required with the tool (with test tools, for example) and of course, which tool fits your budget.

Reg Dev: What do you think of Telelogic FastTrack? And what do you think will be the effect of the IBM takeover of Telelogic on this, and on Doors?

Gilbert: Telelogic clearly realised a gap in the requirements management market had arisen. For something web based, easy to deploy and use; but more than just a web based repository for line items. The customer base for Doors means it will carry on being used for many years to come. As for FastTrack, I hope IBM continues developing the product because we feel this addresses an ever increasing requirement in the requirements management tool sector, much the same as Contour does. We'd relish the competition.

Reg Dev: Finally, how do you see RM and ALM developing over the next, say, 10 years?

Gilbert: Ten years ago I remember organisations questioning the merits of using configuration management tools, today you struggle to find development teams who don't use them. Much the same will happen with the ALM/Requirements Management toolsets. ®

Jama Software, which writes the Contour RM tool resold by Xeau, is trying to crystallise a requirements management community around it here. Early days yet, but it could grow into a useful resource.

Combat fraud and increase customer satisfaction

More from The Register

next story
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.