{"id":31647,"date":"2019-06-04T03:16:24","date_gmt":"2019-06-04T07:16:24","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31647"},"modified":"2019-06-04T03:16:24","modified_gmt":"2019-06-04T07:16:24","slug":"consider-nonfunctional-requirements-for-content-services","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/06\/04\/consider-nonfunctional-requirements-for-content-services\/","title":{"rendered":"Consider nonfunctional requirements for content services"},"content":{"rendered":"\n<p>By  <a href=\"https:\/\/www.techtarget.com\/contributor\/Laurence-Hart\">Laurence Hart<\/a>  &#8211;  Many organizations are adopting the content services approach to solving\u00a0<a href=\"https:\/\/searchcontentmanagement.techtarget.com\/definition\/enterprise-content-management-ECM\">enterprise content management<\/a>\u00a0challenges. When organizations implement <strong>content services<\/strong> properly, business requirements are embedded in the back end and user experience evolves independently from the platform. This division of labor makes both users and business owners happy. <\/p>\n\n\n\n<p>However, developers also need to consider nonfunctional requirements &#8212; such as security, auditing, reporting and accessibility &#8212; early in the development process in order for <strong>content services<\/strong> to be successful.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/06\/network-2402637__340-2.jpg\" alt=\"\" class=\"wp-image-31648\" width=\"305\" height=\"161\"\/><\/figure><\/div>\n\n\n\n<p>Have you ever gone to release an application and had to wait because a security scan fails? Nobody ran the scan until the team was almost done building the application, because it would be pointless to scan an application for security holes when it isn&#8217;t complete. You wouldn&#8217;t test the security of a half-built house, would you?<\/p>\n\n\n\n<p>Moreover, the security team wants to scan a relatively complete version of the final application to save time. The problem with this approach is that waiting to address security requirements late in the process makes them harder to fix.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/searchcontentmanagement.techtarget.com\/tip\/Consider-nonfunctional-requirements-for-content-services&amp;ct=ga&amp;cd=CAEYBioUMTE3MTA4OTgzOTkyOTQwNjA3NzgyGjQwNDMwNWJiNTFkYzJlNmU6Y29tOmVuOlVT&amp;usg=AFQjCNGw4Gt_BrluZ553viI1v4aA5ZRpwg\">Read more: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Laurence Hart &#8211; Many organizations are adopting the content services approach to solving\u00a0enterprise content management\u00a0challenges. When organizations implement content services properly, business requirements are embedded in the back end and user experience evolves independently from the platform. This division <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/06\/04\/consider-nonfunctional-requirements-for-content-services\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[658],"tags":[659],"class_list":["post-31647","post","type-post","status-publish","format-standard","hentry","category-content-services","tag-content-services"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31647"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31647\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}