Forums for the Business Analyst

  Modern Analyst Forums  Business and Sy...  Requirements  Risk Mitigation / Management
Previous Previous
Next Next
New Post 11/30/2016 9:34 AM
User is offline Ankit
1 posts
No Ranking

Risk Mitigation / Management 
Hello Gang!
In my first assignment working for the local city government as a Business Analyst, I have just completed an RFP document for a property management system the city's affordable housing department requires.


I am now facing an interesting dilemma. I am very much skeptical that not one vendor will be able to deliver all of the different modules of requirements that we have in the RFP (Enforcements, Rentals, Sales, Maintenance etc.) in one software. Some will be able to deliver the module on enforcements, while some who specialize on sales and rentals will be able to provide a solution for that.


How do I go about finding a workaround for this? I know I can have the RFP state that we will accept multiple vendors bid for different modules, but I figure I will have a hard time convincing the management (my employers) on this.


What do you guys think? I am looking for strategies that I can adopt to create a win-win for all.
Let me know if there's more information that I can provide to help you better understand the issue. Looking forward to some interesting propositions.


Thank you!
New Post 8/15/2017 4:01 PM
User is offline Nimbocrux
2 posts
No Ranking

Re: Risk Mitigation / Management 

Is there a reason why consortia can't apply for this? Have the best enforcement people team with the best collections people and then contract an maintenance team? Projects I've worked on\bid for seem to do this?


Good luck

Previous Previous
Next Next
  Modern Analyst Forums  Business and Sy...  Requirements  Risk Mitigation / Management

Community Blog - Latest Posts

If you are building a reusable Security Product tool to specifically address Security Technical Implementation Guide (STIG)  Findings, should the requirements be considered Non Functional Requirements or Functional Requirements? For example if there are a number of STIGs such as: The minimum password length shall be 15 characters ...
1 Responses
Bert Wagner
Bert Wagner
It’s 4:30 pm on Friday and Mr. Manager comes along to tell you that he needs you to run some important ad-hoc analysis for him. Previously this meant having to stay late at the office, writing cumbersome queries to extract business information from transactional data. Lucky for you, you’ve recently started using Temporal Tables in SQL...
0 Responses
Ronak Sanghavi
Ronak Sanghavi
Current State For many years now, the most commonly used metaphor on Business Analysis has been the “Bridge”. However, in recent past, some in the BA community have started revisiting the metaphor resulting in a debate on how relevant it is. Of course, the value business analysis can provide for an organization does not depend on how i...
2 Responses

Upcoming Live Webinars

Latest Articles

Requirements for Devices Around Us: Embedded Systems, Part 2
Oct 22, 2017
 In this article we look at some quality attributes that are particularly vital to explore when specifying requirements for embedded systems proj...
Featured Digital Library Resources 
Copyright 2006-2015 by Modern Analyst Media LLC