Meeti Khare wrote:Thanks Rohid,
But somehow i did not feel that Cade's book has given proper example, or may be I could not understand it.
Thanks Bigwood,
can you please elaborate on this "something else" ?
For example, you are going to use a 3rd party tool, there is the risk that it might not fit into your future requirement, or it is hard to fit into your current system because of some weird protocol the tool is using. I think this is also a risk, but I don't think it might be the top 3 in you case.
NFRs need to be addressed, but many serious risks are also from NFRs.