Products
itemis ANALYZE
Documentation
Navigation
Home
Services
Digital Engineering
AI and ML
Contact
Cloud & Enterprise Systems
Contact
Products
itemis SECURE
Overview
Documentation
Contact
itemis ANALYZE
Overview
Documentation
Adapters
Contact
itemis CREATE
Overview
Features
Documentation
User Guide
Tutorials & Videos
Examples
Licenses
Services & Trainings
Resources
Contact
Download
Knowledge & Expertise
Knowledge-Center
Cybersecurity
Cybersecurity: ISO/SAE 21434
Cybersecurity: TARA
Cybersecurity: itemis SECURE
Cybersecurity: Excel
Webinars & Whitepapers
Success Stories
Research Projects
Blog
About itemis
About us
Partner
Research Projects
Career
Coding for Kids
Career
Blog
About this blog
Overview
Documentation
Adapters
Contact
Imprint
Privacy policy
Terms & Conditions
Sitemap
Skip to content
Table of contents
What is Requirements Traceability?
Overview of itemis ANALYZE
First steps with itemis ANALYZE
Linking artifacts of the development process with ANALYZE Editor
Browsing existing artifacts and links
Identifying changes in a project
Analyzing your projects traceability status: the Analysis perspective
Connecting itemis ANALYZE to various tools
Miscellaneous
Release notes
itemis ANALYZE 24-08 (1.1.2436)
itemis ANALYZE 24-04 (1.1.2351)
itemis ANALYZE 23-12 (1.1.2351) Bugfix 1
itemis ANALYZE 23-12 (1.1.2351)
itemis ANALYZE 23-08 (1.1.2333)
itemis ANALYZE 23-04 (1.1.2317)
X Release (XM5 1.1.2317)
W release (WM5 1.1.2248)
V release (VM5 1.1.2235)
U release (UM5 1.1.2218)
T release (TM5 1.1.2150)
S release (SM5 1.1.2133)
R release (RM5 1.1.2116)
Q release (QM5 1.1.2051)
P release (PM5 1.1.2034)
O release, release version (milestone 5 OM5 1.1.2017)
O release, milestone 3 (OM3 1.1.2013)
O release, milestone 2 (OM2 1.1.2009)
O release, milestone 1 (OM1 1.1.2005)
N release (NM5 1.1.1951)
N release, milestone 3 (NM3 1.1.1947)
N release, milestone 2 (NM2 1.1.1943)
N release, milestone 1 (NM1 1.1.1939)
M release (MM5 1.1.1934)
M release, milestone 3 (MM3 1.1.1930)
M release, milestone 2 (MM2 1.1.1926)
M release, milestone 1 (MM1 1.1.1922)
L release, milestone 5 (LM5 1.1.1917)
L release, milestone 3 (LM3 1.1.1913)
L release, milestone 2 (LM2 1.1.1909)
L release, milestone 1 (LM1 1.1.1905)
K release (KM5 1.1.1850)
K release, milestone 3 (KM3 1.1.1846)
K release, milestone 2 (KM2 1.1.1842)
K release, milestone 1 (KM1 1.1.1838)
J release (JM5 1.1.1831)
J release, milestone 3 (JM3 1.1.1826)
J release, milestone 2 (JM2 1.1.1821)
J release, milestone 1 (JM1 1.1.1817)
I release (IM5 1.1.1813)
I release, milestone 3 (IM3 1.1.1809)
I release, milestone 2 (IM2 1.1.1805)
I release, milestone 1 (IM1 1.1.1801)
H release (HM5 1.1.1749)
HM3 (1.1.1743)
HM2 (1.1.1739)
HM1 (1.1.1735)
G-Release (GM5 1.1.1734)
GM3 (1.1.1726)
GM2 (1.1.1722)
GM1 (1.1.1718)
F-Release (FM5 1.1.1715)
FM3 (1.1.1709)
FM2 (1.1.1705)
FM1 (1.1.1701)
EM6 (1.1.1649)
EM5 (1.1.1647)
EM4 (1.1.1643)
EM3 (1.1.1639)
EM2 (1.1.1635)
EM1 (1.1.1631)
DM4 (1.1.1627)
1.1.1625
1.1.1623
1.1.1621
1.1.1619
1.1.1617
1.1.1613
1.1.1611
1.1.1609
1.1.1607
1.1.1605
1.1.1603
1.1.1552
1.1.1540
1.1.1532
1.1.1510
1.1.1508
1.1.1506
1.1.1
1.1.0
1.0.2
1.0.1
1.0.0
1.1.1619
Copy link to clipboard
New features
Added Suspicious Validation for Excel and Enterprise Architect invasive storages
YT is able to store links in Enterprise Architect invasively
Improvements
Improved performance when reading data from DOORS
Bug fixes
Key-based link derivation for invasive storages and Attribute Mapping is more robust regarding missing keys
Re-enabled code completion during configuration of artifact types for PTC Integrity
1.1.1621
1.1.1617