![]() |
![]() |
![]() |
|
![]() |
|||
| RE 1: Investigating User Demand |
RE1 - Erhebung des Anwenderbedarfs
Contents
|
|
|---|
Product Flow
| From | Product | to | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Activity | State | Chapter | Title | Activity | State | ||||||||||||
| External (1) | - | All | Existing source code | - | -
| External (1) |
- |
All |
Further information (2) |
- |
-
| - |
- |
All |
User Demand |
RE2 |
RE3 RE4 RE8 External (1) submitted
| |
Handling
Figure RE 1: Investigating User Demand
When specifying the User Demand, the actual state of the existing source code and all other available/existing system and software documentation can be used and analyzed in order to find out possible weak points with regard to aspects of reverse engineering. Solutions will be defined for the detected weak points. The technical feasibility and economic efficiency of the defined solutions will be investigated.
Sub-activities
(2) Other system and software documentation and all other available information.
![]() |
![]() |
GDPA Online
Last Updated 01.Jan.2002
Updated by Webmaster
Last Revised 01.Jan.2002
Revised by Webmaster
![]() |