1 / 3

CT-044 – Módulo 1 Application Requirements and Design

CT-044 – Módulo 1 Application Requirements and Design. Agenda. Lesson 1: Evaluating Requirements and proposing a Design What Makes a Good Set of Application Requirements? Evaluating the Requirements for the Application Recommending the Best Technologies for the Application

Download Presentation

CT-044 – Módulo 1 Application Requirements and Design

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CT-044 – Módulo 1Application Requirements and Design

  2. Agenda • Lesson 1: Evaluating Requirements and proposing a Design • What Makes a Good Set of Application Requirements? • Evaluating the Requirements for the Application • Recommending the Best Technologies for the Application • Investigating Existing Solutions for Similar Business Problems • Creating a High-Level Application Design • Lab: Evaluate Requirements and Propose a Design

  3. Agenda (cont.) • Lesson 2: Creating a Proof-of-Concept Prototype to Refine anApplication’s Design • What Constitutes a Good Prototype? • Mockups and Proof-of-Concept Prototypes • Creating a Prototype to Evaluate Key Design Decisions • Confirm a Server-Side Versus a Client-SideExperience • Confirmthe Application Container • Define User Interface Elements to Confirm Requirements • Evaluate Web Service Recommendations • Evaluate Your Proposed Security Model • Evaluate Third-Party Applications or Controls • Evaluate Proposed Data Access and Storage Methods • Evaluate Your State Management Decisions • Confirm and Refine the Recommended Architecture • Demonstrating the Feasibility of the Design • Lab: Create a Proof-of-Concept Prototype

More Related