12 KiB
UDTM Analysis Template
Task Overview
Task: [Brief Description of the Task/Problem] Date: [YYYY-MM-DD] Analyst: [Name/Role] Project: [Project Name] Story/Epic: [Reference ID]
Phase 1: Multi-Angle Analysis
Technical Perspective
Correctness:
- [Analysis of technical accuracy and implementation correctness]
- [Verification against specifications and requirements]
- [Identification of potential technical errors or oversights]
Performance:
- [Resource usage analysis (CPU, memory, network)]
- [Scalability considerations and bottlenecks]
- [Response time and throughput expectations]
Maintainability:
- [Code readability and organization]
- [Modularity and extensibility]
- [Documentation and knowledge transfer requirements]
Security:
- [Vulnerability assessment]
- [Data protection and privacy considerations]
- [Authentication and authorization requirements]
Business Logic Perspective
Requirement Alignment:
- [Mapping to business requirements and acceptance criteria]
- [Verification against user stories and use cases]
- [Identification of requirement gaps or misunderstandings]
User Impact:
- [User experience considerations]
- [Accessibility and usability factors]
- [Impact on different user personas]
Business Value:
- [ROI and value proposition analysis]
- [Alignment with business objectives]
- [Risk vs. benefit assessment]
Integration Perspective
System Compatibility:
- [Compatibility with existing systems and components]
- [Dependencies and coupling analysis]
- [Version compatibility and migration considerations]
API Consistency:
- [API design consistency with existing patterns]
- [Contract compatibility and versioning]
- [Documentation and discoverability]
Data Flow:
- [Data consistency and integrity]
- [Transaction boundaries and ACID properties]
- [Data transformation and validation requirements]
Edge Case Perspective
Boundary Conditions:
- [Input validation and boundary testing]
- [Limit conditions and overflow scenarios]
- [Empty data and null value handling]
Error Scenarios:
- [Error handling and recovery mechanisms]
- [Graceful degradation strategies]
- [User feedback and error reporting]
Resource Limits:
- [Memory and storage constraints]
- [Network and timeout limitations]
- [Concurrent user and load handling]
Security Perspective
Vulnerabilities:
- [Common security weakness analysis (OWASP Top 10)]
- [Input sanitization and validation]
- [SQL injection and XSS prevention]
Attack Vectors:
- [Potential attack surfaces]
- [Authentication and session management]
- [Data exposure and information leakage]
Performance Perspective
Resource Usage:
- [CPU and memory utilization patterns]
- [I/O operations and disk usage]
- [Network bandwidth requirements]
Scalability:
- [Horizontal and vertical scaling considerations]
- [Load distribution and balancing]
- [Caching and optimization strategies]
Phase 2: Assumption Challenge
Identified Assumptions
-
Assumption: [First identified assumption]
- Evidence For: [Supporting evidence, facts, or documentation]
- Evidence Against: [Contradicting evidence or alternative explanations]
- Risk Level: [High/Medium/Low]
- Impact if Wrong: [Consequences if assumption proves false]
- Verification Method: [How to validate this assumption]
-
Assumption: [Second identified assumption]
- Evidence For: [Supporting evidence, facts, or documentation]
- Evidence Against: [Contradicting evidence or alternative explanations]
- Risk Level: [High/Medium/Low]
- Impact if Wrong: [Consequences if assumption proves false]
- Verification Method: [How to validate this assumption]
-
Assumption: [Third identified assumption]
- Evidence For: [Supporting evidence, facts, or documentation]
- Evidence Against: [Contradicting evidence or alternative explanations]
- Risk Level: [High/Medium/Low]
- Impact if Wrong: [Consequences if assumption proves false]
- Verification Method: [How to validate this assumption]
Critical Dependencies
Dependency 1: [First critical dependency]
- Nature: [Technical/Business/Resource dependency]
- Risk Assessment: [Impact if dependency fails]
- Mitigation Strategy: [How to handle dependency failure]
Dependency 2: [Second critical dependency]
- Nature: [Technical/Business/Resource dependency]
- Risk Assessment: [Impact if dependency fails]
- Mitigation Strategy: [How to handle dependency failure]
Assumption Validation Results
- [Summary of assumption validation efforts]
- [Assumptions confirmed vs. those requiring further investigation]
- [High-risk assumptions requiring immediate attention]
Phase 3: Triple Verification
Source 1: Documentation/Specifications
Reference: [Official documentation, specifications, or standards] Findings:
- [Key information discovered from this source]
- [Alignment with current understanding]
- [Any conflicts or gaps identified] Confidence: [1-10 scale confidence in this source] Relevance: [How directly this applies to current task]
Source 2: Existing Codebase
Reference: [Relevant code files, patterns, or existing implementations] Findings:
- [Patterns and practices discovered in existing code]
- [Consistency requirements and constraints]
- [Lessons learned from existing implementations] Confidence: [1-10 scale confidence in this source] Relevance: [How directly this applies to current task]
Source 3: External Validation
Reference: [External tools, testing, expert consultation, or research] Findings:
- [External validation results or expert opinions]
- [Tool-based analysis or automated verification]
- [Industry best practices or standards] Confidence: [1-10 scale confidence in this source] Relevance: [How directly this applies to current task]
Cross-Reference Analysis
Alignment: [All sources agree / Partial agreement / Significant conflicts] Conflicts Identified:
- [Specific areas where sources disagree]
- [Impact of these conflicts on implementation approach]
- [Additional investigation required]
Resolution Strategy:
- [How conflicts will be resolved]
- [Additional sources or validation needed]
- [Decision-making process for ambiguous areas]
Phase 4: Weakness Hunting
Potential Failure Points
-
Failure Mode: [First identified potential failure]
- Probability: [High/Medium/Low - likelihood of occurrence]
- Impact: [High/Medium/Low - severity if it occurs]
- Detection: [How this failure would be discovered]
- Mitigation: [Preventive measures and contingency plans]
-
Failure Mode: [Second identified potential failure]
- Probability: [High/Medium/Low - likelihood of occurrence]
- Impact: [High/Medium/Low - severity if it occurs]
- Detection: [How this failure would be discovered]
- Mitigation: [Preventive measures and contingency plans]
-
Failure Mode: [Third identified potential failure]
- Probability: [High/Medium/Low - likelihood of occurrence]
- Impact: [High/Medium/Low - severity if it occurs]
- Detection: [How this failure would be discovered]
- Mitigation: [Preventive measures and contingency plans]
Edge Cases and Boundary Conditions
Edge Case 1: [First edge case scenario]
- Scenario: [Detailed description of the edge case]
- Handling Strategy: [How this will be addressed]
- Testing Approach: [How to verify proper handling]
Edge Case 2: [Second edge case scenario]
- Scenario: [Detailed description of the edge case]
- Handling Strategy: [How this will be addressed]
- Testing Approach: [How to verify proper handling]
Integration Risks
Integration Risk 1: [First integration concern]
- Risk Description: [Detailed description of the integration risk]
- Probability: [Likelihood of this risk materializing]
- Impact: [Consequences if the risk occurs]
- Mitigation: [Steps to prevent or handle this risk]
Integration Risk 2: [Second integration concern]
- Risk Description: [Detailed description of the integration risk]
- Probability: [Likelihood of this risk materializing]
- Impact: [Consequences if the risk occurs]
- Mitigation: [Steps to prevent or handle this risk]
What Could We Be Missing?
- [Systematic review of potential blind spots]
- [Areas where expertise might be lacking]
- [External factors that could impact the solution]
- [Hidden complexity or requirements]
Phase 5: Final Reflection
Complete Re-examination
Initial Approach: [Original approach and reasoning] Alternative Approaches Considered:
- [Alternative 1]: [Description and trade-offs]
- [Alternative 2]: [Description and trade-offs]
- [Alternative 3]: [Description and trade-offs]
Final Recommendation: [Chosen approach with justification]
- Rationale: [Why this approach is superior]
- Trade-offs Accepted: [What we're giving up for this choice]
- Risk Acceptance: [Risks we're willing to accept]
Confidence Assessment
Overall Confidence: [1-10] (Must be >9.5 to proceed) Reasoning:
- [Detailed explanation of confidence level]
- [Factors contributing to confidence]
- [Factors detracting from confidence]
Confidence Breakdown:
- Technical Feasibility: [1-10]
- Requirements Understanding: [1-10]
- Risk Assessment: [1-10]
- Implementation Approach: [1-10]
- Integration Complexity: [1-10]
Remaining Uncertainties
Uncertainty 1: [First remaining uncertainty]
- Nature: [What exactly is uncertain]
- Impact: [How this uncertainty affects the project]
- Resolution Plan: [How to address this uncertainty]
- Timeline: [When this needs to be resolved]
Uncertainty 2: [Second remaining uncertainty]
- Nature: [What exactly is uncertain]
- Impact: [How this uncertainty affects the project]
- Resolution Plan: [How to address this uncertainty]
- Timeline: [When this needs to be resolved]
Quality Gate Confirmation
- Technical Feasibility Confirmed: Solution is technically achievable
- Requirements Alignment Verified: Solution meets all requirements
- Risk Mitigation Planned: All major risks have mitigation strategies
- Integration Strategy Defined: Clear plan for system integration
- Testing Strategy Established: Comprehensive testing approach defined
- Success Criteria Clarified: Clear definition of successful completion
Final Decision and Next Steps
Proceed Decision
Proceed: [ ] Yes / [ ] No / [ ] Conditional Reasoning:
- [Clear justification for the decision]
- [Key factors influencing the decision]
- [Any conditions that must be met]
Implementation Strategy
Approach: [High-level implementation strategy] Phase 1: [First phase activities and deliverables] Phase 2: [Second phase activities and deliverables] Phase 3: [Third phase activities and deliverables]
Risk Monitoring
Key Risks to Monitor:
- [Risk 1]: [Monitoring approach and triggers]
- [Risk 2]: [Monitoring approach and triggers]
- [Risk 3]: [Monitoring approach and triggers]
Success Metrics
Primary Metrics: [How success will be measured] Secondary Metrics: [Additional indicators of success] Monitoring Frequency: [How often metrics will be reviewed]
Next Immediate Actions
- [First immediate action required]
- [Second immediate action required]
- [Third immediate action required]
Analysis Sign-off
Analyst: [Name] - [Date] Reviewer: [Name] - [Date] Approved: [ ] Yes / [ ] No Final Confidence: [1-10] Ready to Proceed: [ ] Yes / [ ] No