Skip to content

Commit

Permalink
changes part 2 doc
Browse files Browse the repository at this point in the history
  • Loading branch information
uo264915 committed Feb 5, 2024
1 parent 27dc139 commit 1acb999
Showing 1 changed file with 8 additions and 8 deletions.
16 changes: 8 additions & 8 deletions docs/src/02_architecture_constraints.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -11,58 +11,58 @@ Architects should know exactly where they are free in their design decisions and
Constraints must always be dealt with; they may be negotiable, though.


=== 2.1 Technical Constraints
=== Technical Constraints
[cols="1,1", options="header"]
|===
| Constraint | Description
| Application Server Version | Usage of version X.X of the application server is required.
| Compatibility with Operating Systems | The application must be compatible with Windows .
|===

=== 2.2 Legal and Regulatory Constraints
=== Legal and Regulatory Constraints
[cols="1,1", options="header"]
|===
| Constraint | Description
| Compliance with Privacy Regulations | The application must comply with privacy regulations in country Spain.
|===

=== 2.3 Development Constraints
=== Development Constraints
[cols="1,1", options="header"]
|===
| Constraint | Description
| Development Methodology | The team will follow an agile development methodology.
| Build Tool | The Z build tool will be used for the compilation process.
|===

=== 2.4 Organizational Constraints
=== Organizational Constraints
[cols="1,1", options="header"]
|===
| Constraint | Description
| Internal Security Policies | Internal security policies of the organization will be adhered to.
|===

=== 2.5 Interoperability Constraints
=== Interoperability Constraints
[cols="1,1", options="header"]
|===
| Constraint | Description
| Communication Standard | The application must be compatible with communication standard ABC.
|===

=== 2.6 Security Constraints
=== Security Constraints
[cols="1,1", options="header"]
|===
| Constraint | Description
| Two-Factor Authentication | Two-factor authentication is mandatory for all users.
|===

=== 2.7 Performance Constraints
=== Performance Constraints
[cols="1,1", options="header"]
|===
| Constraint | Description
| Response Time | The application's response time should not exceed 2 seconds.
|===

=== 2.8 Maintenance and Scalability Constraints
=== Maintenance and Scalability Constraints
[cols="1,1", options="header"]
|===
| Constraint | Description
Expand Down

0 comments on commit 1acb999

Please sign in to comment.