Skip to main content

Requegesis


Requegesis is the critical interpretation of requirements. It’s at the same time an art and methodical approach to understand history, origin, background (also cultural), criticality and validity of requirements. The goal of requegesis is to find the best functional response to requirements while taking liberty in their interpretation.

The word “requegesis” itself is a portmanteau - a linguistic blend - of the two words “requirement” and “exegesis”. The first part of the word “requ” is used in the traditional sense of the "singular documented physical and functional need that a particular design, product or process must be able to perform". The second part of the word exegesis (from the greek “to lead out”) is the “critical explanation or interpretation of a text, particularly a religious text. “

I think exegesis with the connotation of being used for religious texts underlines the way some requirements being treated as sacrosanct rather than critically interpreted in the current context.

Requegesis is a critical skill used when requirements are provided without further background (for example in public procurement requests) or when limited interaction between requestor and provider is possible and businesses struggle to respond with detailed analysis on effort, time and costs required to provide the goods or services.

Requegesis may be used when discussing how a functional specification can be traced to requirements and no clear lineage is available. In this case the verb can be altered to another portmanteau "requeguess" as in "we requeguessed URS-D-17 to include interfaces to CRM since that is what the customer uses today - but does not specify explicitly".  This means that the team took liberty to interpret requirements in context rather than taking them literally.

As of today, I have not been able to find any usage of this term online. I herewith declare 19th of November 2015 as the first public usage of the new word requegesis. Let’s see if this catches on.

Comments

Popular posts from this blog

Sony is evil

I just so agree with Todd: Bad Company of the Year Award! : The company that I am putting at the top of my list is a 4 letter word so foul, that it has been banned from my home. I have asked my wife who is Japanese to refrain from buying any of their products for the next 5 years. The Bad company of the year is no other than SONY… Sony is just a big no-buy company. My girlfriend knows why Sony is evil and we both will rather buy a more expensive or less appealing product from a competitor. " Sony is evil " has only 726 hits on Google, but this will increase. Edit: More about the damage Sony does: Artists revolt against DRM Portable stereo's creator got his due, eventually

Why did Microsoft cripple Groove?

I'm currently trying to use Microsoft Groove 2007 as a collaboration tool to gather requirements. What I like about tools like Groove is: - You can open and edit an entry without having to start an additional application (like word, excel) - You can copy and paste pictures (screenshots) directly into an entry - You don't have to save and re-attach changed files - You can work offline - Groove works inside and outside of our network out-of-the-box - We have (as a Microsoft Gold Partner) 100 licenses available What I don't understand about the current offering is that a lot of tools available in the last version have been removed: The following tools and toolsets are no longer available for adding to new or existing workspaces : Contact Manager, Discussion, Document Review, Outliner , Task Manager, Text, Tic- Tac -Toe, Web Links, Welcome Page, Advanced Project Toolset , and Mobile Workspace for SharePoint . (Source: Microsoft Office Groove Help) There is also a large set

Two factor authentication outdated?

According to the article below from The Register (quoting Bruce Schneier), two-factor authentication seems already be outdated. I believe, we should take a careful approach here: Two-factor authentication is certainly better than just user-id and password. Especially online banking in the US has been using just user-id/password and now they are paying the prize for this lax security measure. Stepping up to use onetime passwords (such as RSA SecurID or Aladin tokens) is a first step against sniffing out passwords. However, there is no such thing as complete security. But two-factor authentication is a first step. As every Information Security Officer nows, user awareness is key to increase security. By giving user a device, this awareness increases dramatically. Link to original article. New threats need new response Banks are spending millions on two-factor authentication for their customers but the approach no longer provides adequate protection against fraud or identity theft, accord