The system must be able to record, process and store 1000 sensor inputs per minute.
Capacity to process 1000 sensor inputs per minute
Related Qualities
Directly Related Quality Requirements
Related here means "having the same tags/properties (efficient)".- Access control is enforced
- Access Control via SSO
- Access find function in three seconds
- Accessible User Interface
- Detailed audit log
- Accurate estimate of insurance contract rate
- Vehicle's position validity influences accuracy
- Add new product under 60 minutes
- Affordable CRM (customer relationship management)
- Appearance of mobile UI
- Assess impact of proposed change
- Authenticity of a digital document
- Budget constrained library update
- Save at least 20% of carbon emissions with every new version
- Service Circuit Breakers and Graceful Degradation
- Clarity in technical documentation
- Compatible with 5 different battery providers
- Compliance with WCAG accessibility guidelines
- Compliance with UI styleguide
- Configurable UI theme
- Consistent keyboard shortcuts
- Content Moderation Fairness
- Convenient online banking
- Core functions can be used on multiple OSs
- Credit Scoring Fairness
- CRM System Data Synchronization
- Cultural Sensitivity in Content
- Data Throughput for Visual Test System
- Detect inconsistent user input
- Display Data Based on Context
- Easily change cloud provider
- Easily understandable acceptance test cases
- Easy UI
- Efficient change of business rules
- Efficient generation of test data
- Fast and accurate sensor
- Efficient save function
- Employee attempts to modify pay rate
- Encrypted storage
- Expressive error messages
- Facial Recognition Bias Mitigation
- Fast creation of sales report
- Fast deployment
- Fast rollout of changes
- Fast shutdown time (less than 10 sec)
- Fast startup time (less than 90 sec)
- Financial Data Accuracy for Reporting
- Global Explainability
- Severe errors are detected and the system shuts down into safe state
- Hiring Algorithm Bias Mitigation
- Inclusive User Testing
- Independent enhancement of subsystem
- Independent replacement of subsystem
- Rollout of a new feature
- Interoperable with Java 12
- Interruptable backend process
- Minimize jitter in real-time data streaming
- Keep data on error
- New users learn to find articles on their own
- Backup patient monitoring sensor takes over
- Local Explainability
- Localizable to several languages
- Every data modification is logged
- Low change-failure rate
- Low effort deployment
- Low impact diagnosis
- Modular System for Data Analysis
- Restored to fully functional state 12h after complete failure
- Multilinguality Support
- New Features Introduce No Bugs
- Near instant search results
- Confidentiality by multi-tenancy
- Maintainable checking strategies
- System can run >12h without re-booting the operating system
- Only authenticated users can access data
- Order queue
- Parallel Data Modification
- Patient Data Quality in Healthcare System
- Portable Business Data Checker
- Precise calculation of gamma coefficient
- Precision of vehicle's orientation
- Protect Data by Establishing Security Protocols
- Low-overhead query execution measurement
- Quick unit tests
- Quickly locate bugs
- Good code readability score
- Recognize Assistive Technologies
- Reduce energy consumption with every new version
- Available 7x24 with 99% uptime
- Reliable ERH System
- Reliable Backup and Restore
- Replication and Quorum Reads/Writes
- Efficient update of annual accounting report
- Respond to 15000 requests per workday
- Response time for image rendering
- Restore Filter after Log In
- Restricted Memory
- Scale up in 2 Minutes
- Server fails, system continues to operate without downtime
- Handle sudden increase in traffic
- System runs offline
- Test with path coverage in 30min
- Unavailable for max 2 minutes
- Easily understandable generated code
- Up to date API
- Usable Despite Color Blindness
- Usable on Factory Floor
- User Interface can be used in Current Browsers
- Usable With Gloves
- User tries to achieve primary function
- Avoid common vulnerabilities
- Withstand DDoS Attack
- Zero-knowledge data storage