Cookies on this website

We use cookies to ensure that we give you the best experience on our website. If you click 'Accept all cookies' we'll assume that you are happy to receive all cookies and you won't see this message again. If you click 'Reject all non-essential cookies' only necessary cookies providing core functionality such as security, network management, and accessibility will be enabled. Click 'Find out more' for information on how to change your cookie settings.

Specifications?

Do you have a list of requirements and have you thought through the processes you want to model with the system? 

Two useful (and simple) techniques for creating a list of requirements and prioritising them are User Stories and MoSCoW prioritisation.  

Already in Use?

Is the University already using the system you’re interested in and have they done due diligence? 

The system might show up in Information Security TPSA List or in the IT Services Application Catalogue. In that case you could contact purchasing to see if they have negotiated terms or a framework agreement. 

Alternatives? 

Is there an alternative already in use in the University? 

This is a tricky question as the possibilities are endless - the current application catalogue only includes software in use in central services, not the MSD. It doesn't guarantee that the software has been through the entire assurance process.  

The links above can help, and requirements and prioritisation can help with defining the problem. If you are processing research data then consult the Research Data Management Service for advice.