Since this is a very wide-ranging question, I will narrow it down to the range of mobile applications that are most relevant to the example chosen here, which is a mobile medical records application. To start with, let’s consider the following scenario:
a) A tablet-based application with a Windows-based user interface.
This is essentially a Windows application, but which allows the user the convenience of a pen- based interface. Let’s assume that the pen based interface works fine. Then, from a technical perspective, the present analysis can mostly focus on whether the application meets the user’s business requirements and on how well it performs.
Firstly, the performance is irrelevant if the application does not meet the needs of the user! Therefore, here are some questions to ponder:
• Does the weakness that we are considering stem from an inability to meet these requirements?
• Do we have clearly documented business and/or functional requirements to refer back to?
• Was the correlation between requirements and functionality meticulously tracked during analysis, design and development?
• Do we have documented Use Cases to explain the appropriate role playing for this application?
If we did our jobs properly in the first place, then the answer to all of these questions is “yes” and then we can simply match up the actual functionality to the business requirements. This should allow us to determine where the weakness lies and how to address it.
However, to make this more interesting, let’s assume now that we’re dealing with a legacy system that was ported by the company to a mobile application. In that case, we may be dealing with a system that has no proper documentation to refer to.
Here is where proper quality assurance comes into play! Since we’re assuming that the normal process of rigorous testing was never done on the original app, it becomes incumbent upon our intrepid QA person/people to test the heck out of it, in order to determine where it breaks.
That’s the first step in pinpointing where the app is weak, if we have no specs to refer back to. If we do have specs then the task is much easier, but the principle of using rigorous testing to determine when it breaks still applies.
Likewise, if feedback from the users was not part of the development process (which it would have been if we using an Agile methodology!!!), then it is essential to get that feedback now. In other words, if people are already using the app, then we need to know exactly when/how it does or does not meet their needs.
Again, I must emphasize that this should have happened before the app was released, but failing that, let’s get this input now. This will lead to a set of functional requirements that can then be compared with the test results for our QA staff. Essentially the take home message here is this: a combined effort by the analysts, designers, developers and QA staff results in an application that has no surprises. Ideally this would happen before release, but better late than never!
Once all of this has been done, then we can fix the bugs and/or enhance the product, as needed. At this point we know what it actually does versus what it should do, such that it is now a straightforward process to determine what needs to be done in order to stabilize it (i.e. it’s understood that we’re including bug tracking as a subset of this whole process).
Of course, now we come to the ubiquitous issues of maintenance, such as:
• How long will it take?
• How much will it cost?
• Who will do the work?
• Who will pay for it/
• When will it be done?
Sorry to sound like broken record, but once again Agile development comes to the rescue here. After all, fixing or enhancing an app is just a microcosm of the original, overall development process. Thus, the same principles apply:
• Address any unknown/risky issues first
• Get constant feedback from the users
• Ensure effective communication within the dev team, to identify/address problems early
• Release small, frequent iterations
• Test constantly!
b) How corporate strategy directly affects this situation
Another important consideration here is, “What are the relevant apps of our competitors doing?” Thus the above process should also take into account whatever the competition currently does and whether our product is up to snuff.
Indeed, it may even be that the competition has recently added features that make the latest release of our app obsolete! In that case, our app may work just fine and yet still have a significant weakness. Similarly, the technology behind the app must constantly be re-evaluated, with respect to what is currently available “out there”.
The best designed and implemented app in the world may become useless if the technology is
no longer appropriate (e.g. the Yellow Pages). So, this suggests that s/w development should not stand alone: marketing, strategy, product management and other factors need to be considered as well.
The most effective way to ensure that this occurs is to create a system of overlapping competencies, so that all the bases are covered by more than one individual (i.e. like baseball players backing each other up on the field). This requires us to foster an atmosphere of “covering each other’s backs”, as opposed to “looking over each other’s shoulders”. There’s a subtle but critical difference between the two approaches!
Hence, for example, we should have the product manager involved in quality assurance, the development team leader concerned about business management, the chief technology officer wondering about corporate strategy, and so on. Since that appears to be the case already, then the challenge is to propagate this mentality going forward, as we grow.
This leads to two further questions, right off the bat:
• How do we maintain the sense of family/mutual assistance as we grow from a small to medium to large company?
• Why hasn’t this company grown more since its inception?
These are tough questions that are best addressed when we meet. However, I will say this here: if we can’t maintain a congenial atmosphere, then the issue of growth becomes moot (unless we want to become just another big, impersonal corporation).
Conversely, that growth may have been inhibited (intentionally or otherwise) by a desire to maintain that atmosphere. In that case, since our products and the related market are both clearly conducive to growth, then the challenge is clear (which is where I come in!).
c) Addressing the above scenario with apps developed for more specialized devices, such as the
Blackberry, iPhone or iPad
This issue is also beyond the scope of the present discussion and thus best addressed when we meet, but a few quick notes are appropriate here:
• How do we address potential problems with proprietary software? By the way, this also applies to the use of products from potential partners (e.g. Procura, Qualicode and Motion Computing).
• What tools are available to diagnose potential hardware problems that can affect our software products? As trusted partners of RIM, do we have complete access to their diagnostic tools? Similarly, what if the initial assumption above was invalid and the pen based interface was actually the problem – what tools does Motion Computing provide for analyzing their pad computers?
• How relevant is the user’s perspective? Since our products are intended for various user categories (agencies, home care nurses, personal support workers), then the weaknesses in a given app may depend largely on the user’s role.
• Is language an issue? By developing multilingual products, we expose ourselves to potential glitches that derive from the improper mapping of database objects to the application code. On the other hand, if we did/do this right, then we can just as easily accommodate ten languages as two (i.e. the relational database design should make the mapping for numerous languages as simple as for two). Qualicode is now looking to the European market – are we? What about Asia ? 1
• Why are we not developing apps for Apple products? Unless this is prohibited by one
of our partners (e.g. RIM), then what would be involved in this? Would all of the above apply if we were to develop apps for Apple products as well?
• What is the meaning of life?
Okay, maybe that last one was just a bit of a stretch … but the answers to these and many more questions will be forthcoming over the course of our upcoming meeting(s). I’ll be that you just can’t wait!

Piracy of a computer software is unauthorized of illegal copying of the software. Software piracy is not only illegal but also unethical and should be avoided at all costs. This article provides details about software piracy and mentions some of the reasons why you must avoid using such illegal copies. mobile application
ReplyDeletePiracy of a computer software is unauthorized of illegal copying of the software. Software piracy is not only illegal but also unethical and should be avoided at all costs. This article provides details about software piracy and mentions some of the reasons why you must avoid using such illegal copies. here
ReplyDeleteSpyware can be a nightmare for you if your computer is ever infected. Every computer user is constantly reminded about the dangers posed by spywares. The warnings are rather too commonplace that some of us tend to view then as exaggerated. The risk that spywares pose to your computer and your sensitive information is real. Hack a Phone in Singapore
ReplyDeleteAt present, Java is more popular than other programming language. It is also a programming language which is used widely by developers for building desktop GUI application, web applications, web services and mobile apps. But the developers still need robust frameworks, IDEs and development tools to write the applications in Java rapidly and efficiently. Each developer also has option to choose from many Java frameworks, IDEs, and development tools according to his specific needs. Anxiety Treatment South Melbourne
ReplyDeleteSoftware telemarketing firms offer services such as becoming contact centers for client calls, lead generation and appointment setting. Read this article to learn more on how this can become an effective solution for a software firm. Siteklean
ReplyDeletePiracy of a computer software is unauthorized of illegal copying of the software. Software piracy is not only illegal but also unethical and should be avoided at all costs. This article provides details about software piracy and mentions some of the reasons why you must avoid using such illegal copies. cad4sale.com
ReplyDeleteSweet web site , super layout, real clean and utilize pleasant. 토토먹튀
ReplyDeleteIn this article we will talk about what to look for when researching daycare software so that you choose a program that's the right fit for your daycare center. There are a number of different software programs available to help you with managing your center - here are some tips on how to pick the right one. route planning software
ReplyDeleteThis is an article where you can learn everything you need to know about the evolution of fake nails. Fake nails is a fashion statement that is here to stay and I think you should get the most out of it. Why not? best fake id
ReplyDeleteThe cost of new technology is falling. Many schools have adapted to new technology without any problems at all. Others, though, are still in the process of making these tools work for them. fake id usa
ReplyDeleteWith no actual way to make out if the girl has reached an orgasm, most guys wonder if they have been able to satisfy their girl. Almost all the girls have faked orgasm some time or the other. There are several ways that will help you to spot a fake orgasm. Read on further to explore some truths about a fake orgasm. 2021 fake id
ReplyDeleteWhen developing software it is the most modern common practice to do so as a collaborative team effort. Software is now quite large in terms of code content and does so much more than it used to. Customers however have this knack of changing what they want the end product actually do. If you wait until the product is damn near complete before you are aware of any changes this can result in you making a loss instead of a profit. Cinema HD For PC
ReplyDeleteI came to this page by searching google. I have located it quite interesting. thanx for providing this. I will have to visit here again! Autodesk Alias AutoStudio 2021 sale
ReplyDeleteWow! After all I got a blog from where I be capable of genuinely take valuable information regarding my study and knowledge.보증업체
ReplyDeleteAsking questions are truly nice thing if you are not understanding something fully,
ReplyDeleteexcept this article gives nice understanding even안전공원
스포츠토토를 즐기실 때에는 운영기간을 확인하여야 합니다.
ReplyDelete매일 하루에도 수 십개씩 생기고 사라지는 스포츠토토 업계에서 살아남기는 레드오션이라고 다들 말합니다. 이러한 이유로 토토사이트를 선택할 때에는 운영기간과 자본금을 알아본 후 이용하시는 것이 가장 바람직합니다. 먹튀업체가 판을 치고 있기 때문에 우리는 더욱 더 신중한 토토사이트를 컨택하기 위해서 다양한 업체들과 소통하고 협업하여 건전한 스포츠베팅을 즐기는 회원분들에게 최상의 서비스를 제공하여야 한다고 생각합니다 메이저사이트
.
That is a really amazing powerful resource that you’re offering and you just provide it away cost-free!! I that can compare with discovering websites which comprehend the particular valuation on providing you with fantastic learning resource for zero cost. We truly dearly loved examining this web site. Have fun here! For sale Mastercam 2021 with Update 1
ReplyDeleteFree anonymizing proxies are available all over the Internet. There are programs that you install on your computer to access these proxies and there are proxies that you can access over a webpage. What these services do is secure your IP address so that you cannot be directly traced when you visit a website. best free vpn for mac
ReplyDeleteWhen it comes to the problem involving bandwidth applications nothing compares to MPLS solution especially when it's from a reliable service provider. This quality of service allows bandwidth control that is well-allocated. It allows prioritization of critical business applications. But most of all, it thwarts central applications from breakdown due to network congestion. best free vpn for kodi
ReplyDeleteIf you are one of the many people who have chosen sales as your career, you're in luck! That's because there are many new advances that make selling easier, such as contact management software. windows 10 product key
ReplyDeleteFree anonymizing proxies are available all over the Internet. There are programs that you install on your computer to access these proxies and there are proxies that you can access over a webpage. What these services do is secure your IP address so that you cannot be directly traced when you visit a website. vpn free download for windows
ReplyDeleteIt's a well known fact that non-profit organizations have very strict guidelines with regard to the way they run their operations, particularly with accounting and audit trails. Therefore, determining which software solution is the best fit for your particular organization can be a time-intensive process. Here are the top three Do's and Don'ts of selecting a non-profits software solution. outsourcing
ReplyDeleteIt's a well known fact that non-profit organizations have very strict guidelines with regard to the way they run their operations, particularly with accounting and audit trails. Therefore, determining which software solution is the best fit for your particular organization can be a time-intensive process. Here are the top three Do's and Don'ts of selecting a non-profits software solution. help with programming homework
ReplyDeleteIn India software per se is not patentable. The inventions relating to the application of the computer program or software is held patentable under the Indian Patent Act, 1970 when claimed in combination of hardware and software components of a computer which provides a "technical advancement" over the prior art. programming homework service
ReplyDeleteIf your hair is fine and limp or thinning, you can easily apply do-it-yourself, one-piece hair extensions that will immediately transform your hair from thin to full, thick and voluminous. By adding synthetic or natural hair to your own in a five-minute process, you can conceal fine or thinning hair or even hair loss. These single hair pieces are perfect for beginners and, blended with your own hair, they look realistic. While this brief guide is all about the fastest and easiest method of clip-in extensions, it will lead you through the hair choices, application, care and terminology you need to know to choose this glamorous method to conceal your fine or thinning hair issue. hairdresser
ReplyDeleteFree anonymizing proxies are available all over the Internet. There are programs that you install on your computer to access these proxies and there are proxies that you can access over a webpage. What these services do is secure your IP address so that you cannot be directly traced when you visit a website. https://www.telenicosia.it/cybercrime-e-pandemia-come-proteggersi/
ReplyDeleteVPN Services will help you to feel safe while suffering the Internet. You have a full access to the Internet, which could not be sniffed by anyone - hackers, hotspot owners, technicians from your ISP, even government. It also hides your IP address on the Net, so nobody, neither bad guys nor website owners can find your location. www.pianetastrega.com VPN
ReplyDeleteA thoughtful opinion and tips I’ll use on my web page. Youve obviously spent some time on this. Well carried out! Mastercam 2021 cost
ReplyDeleteSmoker cooking is a form of cooking where the smoke from burning wood prepares your foods. This type of cooking allows for a whole range of flavor opportunities. đề đẹp hôm nay
ReplyDeleteSMM PANEL
ReplyDeleteSmm panel
İş İlanları Blog
instagram takipçi satın al
hirdavatciburada.com
BEYAZESYATEKNİKSERVİSİ.COM.TR
servis
tiktok jeton hilesi