Value-Based Software Test Prioritization

Size: px
Start display at page:

Download "Value-Based Software Test Prioritization"

Transcription

1 Value-Based Software Test Prioritization Annual Research Review CSSE-USC Qi Li, Barry Boehm {qli1, March 7, 2012

2 Outline Research Motivation Research Method Case Studies Tool Support Conclusion 3/6/2012 ARR

3 Research Motivation Value-neutral SE methods are increasingly risky [Boehm, 2003] Every requirement, use case, object, test case, and defect is equally important Earned Value Systems don t track business value System value-domain problems are the chief sources of software project failures Testing & Inspection resources are expensive and scarce 30%-50%, even higher for high reliability projects [Ramler, 2005] Time-to-market [Boehm, Huang, 2005] Empirical Findings [Bullock 2000, Boehm & Basili 2001 ] About 20 percent of the features provide 80 percent of business value About 80 percent of the defects come from 20 percent of the modules Value-based Software Engineering 4+1 theorem [Boehm, 2005] 3/6/2012 ARR

4 Outline Research Motivation Research Method Case Studies Tool Support Conclusion 3/6/2012 ARR

5 Value-Based Software Test Prioritization What to be prioritized? Testing items: Testing Scenarios, Testing Features, Test Cases How to prioritize? Value-Based (Business Importance, Risk, Cost) Dependency Aware How to Measure? Average Percentage of Business Importance Earned (APBIE)

6 Research Method: Value-Based Risk Exposure (RE) Where Size (Loss) is the risk impact size of loss if the outcome is unsatisfactory, Pro (Loss) is the probability of an unsatisfactory outcome Risk Reduction Leverage (RRL) Where RE before is the RE before initiating the risk reduction effort and RE after is the RE afterwards. RRL is a measure of the cost-benefit ratio of performing a candidate risk reduction or defect removal activity 3/6/2012 ARR

7 Research Method: Value-Based Value-Based Prioritization Drivers: Business Case Analysis Stakeholder Business Value Prioritization Impact of Defect Defect Criticality Size of Loss Risk Exposure Experience Base Defect-prone Components, Performers Probability of Loss Testing items are to be ranked by how well they can reduce RE 3/6/2012 ARR

8 Research Method: Value-Based Combining with the testing items relative costs =>Priority Trigger: This proposed strategy enables them to be prioritized in terms of Risk Reduction Leverage (RRL) or ROI Supposed to improve the lifecycle cost-effectiveness of defect removal techniques 3/6/2012 ARR

9 Value of software product to organization University of Southern California Research Method: Dependency Aware Tertairy application functions Natural speech input Animated displays Secondary application functions User amenities Main application functions Operating System Basic application functions Data management system Investment High-payoff Diminishing returns Cost of software product [Boehm, 1981] 3/6/2012 ARR

10 Research Method: Dependency Aware Dependency: Example: dependencies among test cases to be executed Solution: Prioritization Algorithm (greedy alg) Select the one with the highest RRL Check dependency 9->3->9->5->9->4->7 3/6/2012 ARR

11 Research Method: Metrics Testing Cost Effectiveness Average Percentage of Business Importance Earned (APBIE) 3/6/2012 ARR

12 Outline Research Motivation Research Method Case Studies Tool Support Conclusion 3/6/2012 ARR

13 Case Studies Results Exercise Test Prioritization based on Risk Reduction Level (RRL) software testing scenarios to be walked through in Galorath.Inc software features to be tested in a Chinese company software test cases to be executed in USC SE course projects All of them show preliminary positive results 3/6/2012 ARR

14 Case Studies Results (Galorath Inc.) Prioritize testing scenarios to be walked through Galorath Inc. (2011 Summer) % 90.12% 93.83% 95.06% 90.00% 83.95% Value-based % 87.65% 80.00% 77.78% 70.00% 60.00% 50.00% 40.00% 30.00% 20.00% 74.07% 35.80% 39.51% 45.68% 51.85% 58.02% 22.22% 16.05% 10.00% 9.88% 4.94% 0.00% 6.17% Stop Testing % 25.93% Value-neutral Value-inverse (worst case) 58.02% PBIE-1 PBIE-2 PBIE-3 APBIE % APBIE % APBIE % Value-based prioritization can improve the cost-effectiveness of testing 3/6/2012 ARR

15 Outline Research Motivation Research Method Case Studies Tool Support Conclusion 3/6/2012 ARR

16 Automated Tool Support (Beta Version) 3/6/2012 ARR

17 Tool Demo Website: 3/6/2012 ARR

18 Future Features Establish the traceability matrix between the requirement specifications and test cases to automatically obtain test case business importance ratings Establish the traceability matrix between test cases and defects in order to automatically predict the fail probability based on the collected historical defect data via incorporating the-state-of-art defect prediction techniques Experiment sensitivity analysis for reasoning and judging the correctness of factors ratings If you would like to be a beta version tester, please contact me at qli1@usc.edu 3/6/2012 ARR

19 Outline Research Motivation Research Method Case Studies Tool Support Conclusion 3/6/2012 ARR

20 Conclusion Propose a Real Earned Value System to Track Business Value of Testing and Measure Testing Efficiency in terms of APBIE Propose a Systematic Strategy for Value-based, Dependency Aware Test Processes Apply This Strategy to a Series of Empirical Studies with different granularities of Prioritizations Elaborate Decision Criteria of Testing Priorities Per Project Contexts, Which are Helpful for Real Industry Practices Implement an automatic tool for its application on large-scale industrial projects 3/6/2012 ARR

21 Question and Answer 3/6/2012 ARR

Test design techniques

Test design techniques INF3121 : Software Testing 12. 02. 2015 Lecture 4 Test design techniques Lecturer: Raluca Florea INF3121/ 12.02.2015 / Raluca Florea 1 Overview 1. The test development process 2. Categories of test design

More information

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer

More information

Measuring Security Investment Benefit and Threat Modeling for Off The Shelf Software Systems

Measuring Security Investment Benefit and Threat Modeling for Off The Shelf Software Systems Measuring Security Investment Benefit and Threat Modeling for Off The Shelf Software Systems - A Stakeholder Value Driven Approach Yue Chen CII Forum Workshop Tutorial 2007 Oct. 31, 2007 USC-CSSE 1 Agenda

More information

Software Testing Interview Question and Answer

Software Testing Interview Question and Answer Software Testing Interview Question and Answer What is Software Testing? A process of analyzing a software item to detect the differences between existing and required conditions (i.e., defects) and to

More information

Risks Matrix. User Guide Risks Matrix Web part

Risks Matrix. User Guide Risks Matrix Web part User Guide Risks Matrix Web part 1 Overview The Risk Matrix web part improves the visibility of the project risks. The Business Need Risk management is an important function in organizations today. Companies

More information

1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake

1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake Sample ISTQB examination 1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake 2 Regression testing should

More information

Software Process. Software Process

Software Process. Software Process Software Process What is SW process? Definition, Development, Support phases Process models: Waterfall Prototyping Spiral, Incremental & iterative (best practices) UP process model What is it? How does

More information

Systematic Software Testing Techniques: Combinatorial Testing. Dr. Renée Bryce Associate Professor University of North Texas

Systematic Software Testing Techniques: Combinatorial Testing. Dr. Renée Bryce Associate Professor University of North Texas Systematic Software Testing Techniques: Combinatorial Testing Dr. Renée Bryce Associate Professor University of North Texas Renee.Bryce@unt.edu 1 Presentation outline Introductions Motivation Background

More information

Counting Software Size: Is It as Easy as Buying A Gallon of Gas?

Counting Software Size: Is It as Easy as Buying A Gallon of Gas? Counting Software Size: Is It as Easy as Buying A Gallon of Gas? October 22, 2008 NDIA 11 th Annual Systems Engineering Conference Lori Vaughan and Dean Caccavo Northrop Grumman Mission Systems Office

More information

Test Plan and Cases (TPC)

Test Plan and Cases (TPC) Test Plan and Cases (TPC) Healthy Kids Zone Survey App Team 14 Name Primary Role Contact Email Andreas Rivera Client ARivera@chc-inc.org Joseph Martinez Client Jmartinez2@chc-inc.org Malcolm Carson Client

More information

ISTQB Advanced Level (CTAL)

ISTQB Advanced Level (CTAL) ISTQB Advanced Level (CTAL) 2012 Syllabus - Overview Mike Smith Chairman, Advanced Level Working Group (ALWG) December 2012 Contents 1 2 3 4 5 6 Introduction to ISTQB CTAL 2012: What s changed? CTAL 2012:

More information

Assuring Certainty through Effective Regression Testing. Vishvesh Arumugam

Assuring Certainty through Effective Regression Testing. Vishvesh Arumugam Assuring Certainty through Effective Regression Testing Vishvesh Arumugam Agenda Introduction The Problem Magnitude Management Regression Test Efficiency Solution and Approach Test Suite Maintenance Determining

More information

Pushing the limits of CAN - Scheduling frames with offsets provides a major performance boost

Pushing the limits of CAN - Scheduling frames with offsets provides a major performance boost Pushing the limits of CAN - Scheduling frames with offsets provides a major performance boost Nicolas NAVET INRIA / RealTime-at-Work http://www.loria.fr/~nnavet http://www.realtime-at-work.com Nicolas.Navet@loria.fr

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Sample Questions ISTQB Foundation Answers

Sample Questions ISTQB Foundation Answers Sample Questions ISTQB Foundation Answers Questions Prepared By Released January 2017 1 C C is correct. This is a defect that directly causes harm to the environment. A is not correct because the unhappy

More information

Making you aware. CS577a 17Fall Team 04

Making you aware. CS577a 17Fall Team 04 1 Making you aware CS577a 17Fall Team 04 2 :.: Outline 1. Operational Concept Overview 2. UI Demo 3. Test Cases and Results 4. Quality Focal Point 5. Transition Plan 3 :.: Operational Concept Overview

More information

Conceptual Framework for Security Testing, Security Risk Analysis and their Combinations

Conceptual Framework for Security Testing, Security Risk Analysis and their Combinations ICSSEA 2012 / STV 12 Conceptual Framework for Security Testing, Security Risk Analysis and their Combinations Li, Yan 1 Contents Introduction Basic concepts The combinations of security testing and security

More information

National Cyber Security Strategy (NCS) Toolkit

National Cyber Security Strategy (NCS) Toolkit National Cyber Security Strategy (NCS) Toolkit Let s create a toolkit to help states to develop or improve their national cyber security strategies Examples of Topics To Be Addressed The role, objectives

More information

Federal Railroad Administration Southeast Regional Rail Planning Study

Federal Railroad Administration Southeast Regional Rail Planning Study Federal Railroad Administration Southeast Regional Rail Planning Study Stakeholder Group Workshop 3 Orlando, Florida Next Steps Sunserea Dalton, CH2M March 1, 2017 Next Steps Provide input on Workshop

More information

Classification and Regression

Classification and Regression Classification and Regression Announcements Study guide for exam is on the LMS Sample exam will be posted by Monday Reminder that phase 3 oral presentations are being held next week during workshops Plan

More information

Extension, Abbreviation and Refinement -Identifying High-Level Dependence Structures Using Slice-Based Dependence Analysis

Extension, Abbreviation and Refinement -Identifying High-Level Dependence Structures Using Slice-Based Dependence Analysis Extension, Abbreviation and Refinement -Identifying High-Level Dependence Structures Using Slice-Based Dependence Analysis Zheng Li CREST, King s College London, UK Overview Motivation Three combination

More information

Learn Well Technocraft

Learn Well Technocraft -This course includes Manual Testing aspects plus basic automation testing tools. The content included in the syllabus is sufficient for clearing the ISTQB certification. Note: We have combo course and

More information

It is primarily checking of the code and/or manually reviewing the code or document to find errors This type of testing can be used by the developer

It is primarily checking of the code and/or manually reviewing the code or document to find errors This type of testing can be used by the developer Static testing Static testing is a software testing method that involves examination of the program's code and its associated documentation but does not require the program be executed. Dynamic testing,

More information

A VULNERBILITY & RISK ASSESSMENT OF SEPTA S MANAYUNK/NORRISTOWN LINE

A VULNERBILITY & RISK ASSESSMENT OF SEPTA S MANAYUNK/NORRISTOWN LINE A VULNERBILITY & RISK ASSESSMENT OF S MANAYUNK/NORRISTOWN LINE : Laura Zale & Erik Johanson August 7, 2012 Southeastern Pennsylvania Transportation Authority Overview : Sixth largest public transportation

More information

WEB CMS SELECTION: How to Go From Shortlist to Final Selection

WEB CMS SELECTION: How to Go From Shortlist to Final Selection WEB CMS SELECTION: How to Go From Shortlist to Final Selection 1 Choosing the right CMS isn t easy. Beyond scalability, there are key concerns around user experience, ease of integration, customizability,

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

Chapter 11, Testing, Part 2: Integration and System Testing

Chapter 11, Testing, Part 2: Integration and System Testing Object-Oriented Software Engineering Using UML, Patterns, and Java Chapter 11, Testing, Part 2: Integration and System Testing Overview Integration testing Big bang Bottom up Top down Sandwich System testing

More information

Lecture 19 Engineering Design Resolution: Generating and Evaluating Architectures

Lecture 19 Engineering Design Resolution: Generating and Evaluating Architectures Lecture 19 Engineering Design Resolution: Generating and Evaluating Architectures Software Engineering ITCS 3155 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at

More information

Test Automation Beyond Regression Testing

Test Automation Beyond Regression Testing Test Automation Beyond Regression Testing Doug Hoffman, BA, MBA, MSEE, ASQ-CSQE Software Quality Methods, LLC. (SQM) www.softwarequalitymethods.com doug.hoffman@acm.org STPCon Spring 2008 Why Automate

More information

(Objective-CS605 Software Engeenring-II)

(Objective-CS605 Software Engeenring-II) Which one of the following is NOT a useful indicator of software quality? Correctness Code size (Page 67) Maintainability Integrity Usability Which one of the following does not belong to a strategy for

More information

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE 2017 COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE NUMBER OF SECURITY BREACHES IS RISING AND SO IS SPEND Average number of security breaches each year 130 Average

More information

Feasibility Evidence Description (FED)

Feasibility Evidence Description (FED) Feasibility Evidence Description (FED) United Direct Marketing Team 9 Fall Semester Chun-Ling Chen Project manager/ Prototyper Chun-Pei Su Lifecycle Planner Shao-yen Cheng System Architect Yuan-Chang Chang

More information

Chapter 11, Testing, Part 2: Integration and System Testing

Chapter 11, Testing, Part 2: Integration and System Testing Object-Oriented Software Engineering Using UML, Patterns, and Java Chapter 11, Testing, Part 2: Integration and System Testing Overview Integration testing Big bang Bottom up Top down Sandwich System testing

More information

Test Design Techniques ISTQB (International Software Testing Qualifications Board)

Test Design Techniques ISTQB (International Software Testing Qualifications Board) Test Design Techniques ISTQB (International Software Testing Qualifications Board) Minsoo Ryu Hanyang University Testing Process Planning and Control Analysis and Design Implementation and Execution Evaluating

More information

Quote by Bruce Sterling, from: A Software Testing Primer, Nick Jenkins

Quote by Bruce Sterling, from: A Software Testing Primer, Nick Jenkins Software Testing Why Test? Quote by Bruce Sterling, from: A Software Testing Primer, Nick Jenkins https://www.typemock.com/software-bugs-infographic A bug found at design time costs ten times less to fix

More information

Start of Lecture: February 10, Chapter 6: Scheduling

Start of Lecture: February 10, Chapter 6: Scheduling Start of Lecture: February 10, 2014 1 Reminders Exercise 2 due this Wednesday before class Any questions or comments? 2 Scheduling so far First-Come-First Serve FIFO scheduling in queue without preempting

More information

How to Create Your Own Fundamental Strategy

How to Create Your Own Fundamental Strategy Chapter X How to Create Your Own Fundamental Strategy In this chapter Step 1. Build a list of fundamental fields 775 Step 2. Select fields for ranking and inclusion in the overall Fundamental Rating 776

More information

MTAT : Software Testing

MTAT : Software Testing MTAT.03.159: Software Testing Lecture 04: Static Testing (Inspection) and Defect Estimation (Textbook Ch. 10 & 12) Spring 2013 Dietmar Pfahl email: dietmar.pfahl@ut.ee Lecture Reading Chapter 10: Reviews

More information

Top 3 Marketing Metrics You Should Measure in Google Analytics

Top 3 Marketing Metrics You Should Measure in Google Analytics Top 3 Marketing Metrics You Should Measure in Google Analytics Presented By Table of Contents Overview 3 How to Use This Knowledge Brief 3 Metric to Measure: Traffic 4 Direct (Acquisition > All Traffic

More information

Oracle Eloqua and Salesforce Closed-Loop Reporting

Oracle Eloqua and Salesforce Closed-Loop Reporting http://docs.oracle.com Oracle Eloqua and Salesforce Closed-Loop Reporting Configuration Guide 2018 Oracle Corporation. All rights reserved 02-Mar-2018 Contents 1 Closed-loop reporting with Salesforce 3

More information

Quality Assurance: Test Development & Execution. Ian S. King Test Development Lead Windows CE Base OS Team Microsoft Corporation

Quality Assurance: Test Development & Execution. Ian S. King Test Development Lead Windows CE Base OS Team Microsoft Corporation Quality Assurance: Test Development & Execution Ian S. King Test Development Lead Windows CE Base OS Team Microsoft Corporation Introduction: Ian King Manager of Test Development for Windows CE Base OS

More information

Sample Exam. Advanced Test Automation Engineer

Sample Exam. Advanced Test Automation Engineer Sample Exam Advanced Test Automation Engineer Answer Table ASTQB Created - 08 American Stware Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,

More information

Basic Training in Software Testing (2 Days)

Basic Training in Software Testing (2 Days) www.peaklearningllc.com Basic Training in Software Testing (2 Days) This is a practical hands-on seminar to cover the critical path of testing. Your instructor will be an experienced practitioner in the

More information

5 STEPS for Turning Data into Actionable Insights

5 STEPS for Turning Data into Actionable Insights 5 STEPS for Turning Data into Actionable Insights Today, nearly every piece of equipment in a data center has at least one sensor attached to it. In fact, American Society of Heating, Refrigerating and

More information

Advanced IT Risk, Security management and Cybercrime Prevention

Advanced IT Risk, Security management and Cybercrime Prevention Advanced IT Risk, Security management and Cybercrime Prevention Course Goal and Objectives Information technology has created a new category of criminality, as cybercrime offers hackers and other tech-savvy

More information

Expert Test Manager: Operational Module Course Outline

Expert Test Manager: Operational Module Course Outline Expert Test Manager: Operational Module Course Outline General Description A truly successful test organization not only has solid, relevant test objectives and a test strategy, but it also has the means

More information

Elements of Requirements Style

Elements of Requirements Style Elements of Requirements Style Sponsored by: Karl Wiegers Principal Consultant, Process Impact www.processimpact.com Introduction to Requirements Analysis Improve Quality & Reduce Risk Author Requirements

More information

Using Metrics to Gain Management Support for Cyber Security Initiatives

Using Metrics to Gain Management Support for Cyber Security Initiatives Using Metrics to Gain Management Support for Cyber Security Initiatives Craig Schumacher Chief Information Security Officer Idaho Transportation Dept. January 2016 Why Metrics Based on NIST Framework?

More information

Nokia Conference Call Fourth Quarter 2010 and Full Year 2010 Financial Results

Nokia Conference Call Fourth Quarter 2010 and Full Year 2010 Financial Results Nokia Conference Call Fourth Quarter 2010 and Full Year 2010 Financial Results January 27, 2011 15.00 Helsinki time 8.00 New York time Stephen Elop President and CEO Timo Ihamuotila CFO Matt Shimao Head

More information

Threat Centric Vulnerability Management

Threat Centric Vulnerability Management Threat Centric Vulnerability Management Solution Brief When it comes to vulnerability management, security leaders continue struggle to identify which of the thousands even millions of vulnerabilities

More information

3 Prioritization of Code Anomalies

3 Prioritization of Code Anomalies 32 3 Prioritization of Code Anomalies By implementing a mechanism for detecting architecturally relevant code anomalies, we are already able to outline to developers which anomalies should be dealt with

More information

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

Six Sigma in the datacenter drives a zero-defects culture

Six Sigma in the datacenter drives a zero-defects culture Six Sigma in the datacenter drives a zero-defects culture Situation Like many IT organizations, Microsoft IT wants to keep its global infrastructure available at all times. Scope, scale, and an environment

More information

Using VectorCAST/C++ with Test Driven Development. Whitepaper V

Using VectorCAST/C++ with Test Driven Development. Whitepaper V Using VectorCAST/C++ with Test Driven Development Whitepaper V2.0 2017-12 Table of Contents 1 Introduction... 3 2 Traditional Software Development... 3 3 Test Driven Development... 4 4 Using VectorCAST/C++

More information

Software Engineering Economics

Software Engineering Economics Course "Softwareprozesse" Software Engineering Economics Lutz Prechelt Freie Universität Berlin, Institut für Informatik http://www.inf.fu-berlin.de/inst/ag-se/ Conventional view: High quality at low cost

More information

Continuous Improvement Toolkit. Normal Distribution. Continuous Improvement Toolkit.

Continuous Improvement Toolkit. Normal Distribution. Continuous Improvement Toolkit. Continuous Improvement Toolkit Normal Distribution The Continuous Improvement Map Managing Risk FMEA Understanding Performance** Check Sheets Data Collection PDPC RAID Log* Risk Analysis* Benchmarking***

More information

In this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs.

In this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs. In this Lecture you will Learn: Testing in Software Development Process Examine the verification and validation activities in software development process stage by stage Introduce some basic concepts of

More information

EXTENDED PRODUCER RESPONSIBILITY PRODUCT EVALUATION TOOL USER GUIDANCE PN 1397

EXTENDED PRODUCER RESPONSIBILITY PRODUCT EVALUATION TOOL USER GUIDANCE PN 1397 EXTENDED PRODUCER RESPONSIBILITY PRODUCT EVALUATION TOOL USER GUIDANCE PN 1397 This guidance document and the accompanying EPR Product Evaluation Tool (Excel matrix) have been developed by Marbek Resource

More information

Chapter 11, Testing, Part 2: Integration and System Testing

Chapter 11, Testing, Part 2: Integration and System Testing Object-Oriented Software Engineering Using UML, Patterns, and Java Chapter 11, Testing, Part 2: Integration and System Testing Overview Integration testing Big bang Bottom up Top down Sandwich System testing

More information

Authority Scoring. What It Is, How It s Changing, and How to Use It

Authority Scoring. What It Is, How It s Changing, and How to Use It Authority Scoring What It Is, How It s Changing, and How to Use It For years, Domain Authority (DA) has been viewed by the SEO industry as a leading metric to predict a site s organic ranking ability.

More information

Earnings Release Conference Second Quarter of FY2017

Earnings Release Conference Second Quarter of FY2017 Earnings Release Conference Second Quarter of FY2017 (July 1, 2017 to September 30, 2017) October 31,2017 Murata Manufacturing Co., Ltd. http://www.murata.com/ir/library/index.html 1. Second Quarter of

More information

Nokia Conference Call 1Q 2012 Financial Results

Nokia Conference Call 1Q 2012 Financial Results Nokia Internal Use Only Nokia Conference Call 1Q 2012 Financial Results April 19 th, 2012 15.00 Helsinki time 8.00 New York time Stephen Elop President & CEO Timo Ihamuotila CFO Matt Shimao Head of Investor

More information

Combined Ranking Method for Screening Collision Monitoring Locations along Alberta Highways

Combined Ranking Method for Screening Collision Monitoring Locations along Alberta Highways Combined Ranking Method for Screening Collision Monitoring Locations along Alberta Highways Robert Duckworth, P. Eng., PTOE, Infrastructure Management System Specialist, Planning Branch, Alberta Transportation

More information

Test Automation. Fundamentals. Mikó Szilárd

Test Automation. Fundamentals. Mikó Szilárd Test Automation Fundamentals Mikó Szilárd 2016 EPAM 2 Blue-chip clients rely on EPAM 3 SCHEDULE 9.12 Intro 9.19 Unit testing 1 9.26 Unit testing 2 10.03 Continuous integration 1 10.10 Continuous integration

More information

Introduction on Usability

Introduction on Usability Introduction on Usability Courtesy of Luca Triacca (luca.triacca@lu.unisi.ch) TEC-Lab University of Lugano www.tec-lab.ch Agenda Introduction on Usability MiLE+: a systematic method for usability evaluation

More information

Pave the way: Build a value driven SAP GRC roadmap March 2015

Pave the way: Build a value driven SAP GRC roadmap March 2015 www.pwc.be/erp Pave the way: Build a value driven SAP GRC roadmap March 2015 Agenda Introduction Measuring GRC Progression & Benchmarking GRC Program Roadmap Building a Business Case 2 Introduction Pave

More information

Software Quality Engineering Tackles Security Issues

Software Quality Engineering Tackles Security Issues Software Quality Engineering Tackles Security Issues Taz Daughtrey Senior Scientist Quanterion Solutions, Inc. Software Quality Group of New England 12 June 2013 Software Quality Engineering Tackles Security

More information

0-1 Programming Model-Based Method for Planning Code Review using Bug Fix History

0-1 Programming Model-Based Method for Planning Code Review using Bug Fix History 0-1 Programming Model-Based Method for Planning Code Review using Bug Fix History Hirohisa Aman Center for Information Technology Ehime University Matsuyama, Japan 790 8577 Email: aman@ehime-u.ac.jp Abstract

More information

IBM Proventia Management SiteProtector Sample Reports

IBM Proventia Management SiteProtector Sample Reports IBM Proventia Management SiteProtector Page Contents IBM Proventia Management SiteProtector Reporting Functionality Sample Report Index 2-25 Reports 26 Available SiteProtector Reports IBM Proventia Management

More information

Advanced Tester Certification Test Manager

Advanced Tester Certification Test Manager Home > Advanced Tester Certification Test Manager Advanced Tester Certification Test Manager Accredited training for the ISTQB Advanced Tester Certification Test Manager (CTAL- TM) certification. This

More information

Visibility Analysis and Management

Visibility Analysis and Management Risk Management Insight Visibility Analysis and Management Jack Jones, CISM, CISSP, CISA RMI Founder Ignorance is not bliss 2 What we ll cover... What do we mean by visibility? Whose visibility are we

More information

PK0-003 Q&As. Project+ (2009) Pass CompTIA PK0-003 Exam with 100% Guarantee. Free Download Real Questions & Answers PDF and VCE file from:

PK0-003 Q&As. Project+ (2009) Pass CompTIA PK0-003 Exam with 100% Guarantee. Free Download Real Questions & Answers PDF and VCE file from: PK0-003 Q&As Project+ (2009) Pass CompTIA PK0-003 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance Following Questions

More information

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018 Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your

More information

SALESFORCE CERTIFIED TECHNICAL ARCHITECT

SALESFORCE CERTIFIED TECHNICAL ARCHITECT Certification Exam Guide SALESFORCE CERTIFIED TECHNICAL ARCHITECT Spring 18 2018 Salesforce.com, inc. All rights reserved. S ALESFORCE CERTIFIED TECHNICAL ARCHITECT CONTENTS About the Salesforce Certified

More information

QTEP: Quality-Aware Test Case Prioritization

QTEP: Quality-Aware Test Case Prioritization QTEP: Quality-Aware Test Case Prioritization {song.wang,jc.nam,lintan}@uwaterloo.ca Electrical and Computer Engineering, University of Waterloo Waterloo, ON, Canada ABSTRACT Test case prioritization (TCP)

More information

Morningstar Direct SM Dates Sets and Calculations

Morningstar Direct SM Dates Sets and Calculations Morningstar has many types of data points organized by standard (pre-defined), historical, and custom calculation data points. You can assemble a custom data set using only data points relevant to your

More information

Applying ISO/IEC Quality Model to Quality Requirements Engineering on Critical Software

Applying ISO/IEC Quality Model to Quality Requirements Engineering on Critical Software Applying ISO/IEC 9126-1 Quality Model to Quality Engineering on Critical Motoei AZUMA Department of Industrial and Management Systems Engineering School of Science and Engineering Waseda University azuma@azuma.mgmt.waseda.ac.jp

More information

Helix Test Case Management Best Practices

Helix Test Case Management Best Practices The following information provides best practices for test case management activities in Helix ALM. These best practices are guidelines. Your testing process and business rules should dictate whether or

More information

Business Analysis in Practice

Business Analysis in Practice Business Analysis in Practice (Level 2 CCBA Certification Preparation Course) Duration: 3 days PM-Partners have been leaders in project management certification for 20 years, training over 8,500 industry

More information

THE STATE OF CLOUD & DATA PROTECTION 2018

THE STATE OF CLOUD & DATA PROTECTION 2018 THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals

More information

Implementing IT Governance

Implementing IT Governance Implementing IT Governance Using COBI C OBIT, ITIL & Six Sigma Peter T. Davis, CISA, CISSP, CDP, CMA, CSP, I.S.P., CNA, CMC, CCNA, CWNA, CISM, COBIT Foundation Certificate, ITIL Foundation Certificate,

More information

HP ALM Overview. Accelerating Innovation, Industrialising Quality. Oren Ziv, Product Manager, QC/ALM

HP ALM Overview. Accelerating Innovation, Industrialising Quality. Oren Ziv, Product Manager, QC/ALM www.hp.com/go/alm HP ALM Overview Accelerating Innovation, Industrialising Quality Oren Ziv, Product Manager, QC/ALM Satisfied customers Largest community 6,000+ worldwide Enterprise scalability to Size

More information

Formal Methods and their role in Software and System Development. Riccardo Sisto, Politecnico di Torino

Formal Methods and their role in Software and System Development. Riccardo Sisto, Politecnico di Torino Formal Methods and their role in Software and System Development Riccardo Sisto, Politecnico di Torino What are Formal Methods? Rigorous (mathematical) methods for modelling and analysing (computer-based)

More information

Question 1: What is a code walk-through, and how is it performed?

Question 1: What is a code walk-through, and how is it performed? Question 1: What is a code walk-through, and how is it performed? Response: Code walk-throughs have traditionally been viewed as informal evaluations of code, but more attention is being given to this

More information

Exploring Econometric Model Selection Using Sensitivity Analysis

Exploring Econometric Model Selection Using Sensitivity Analysis Exploring Econometric Model Selection Using Sensitivity Analysis William Becker Paolo Paruolo Andrea Saltelli Nice, 2 nd July 2013 Outline What is the problem we are addressing? Past approaches Hoover

More information

Sample Exam. Certified Tester Foundation Level

Sample Exam. Certified Tester Foundation Level Sample Exam Certified Tester Foundation Level Answer Table ASTQB Created - 2018 American Stware Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,

More information

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business

More information

Cybersecurity 2016 Survey Summary Report of Survey Results

Cybersecurity 2016 Survey Summary Report of Survey Results Introduction In 2016, the International City/County Management Association (ICMA), in partnership with the University of Maryland, Baltimore County (UMBC), conducted a survey to better understand local

More information

Chapter 3. Requirement Based System Test Case Prioritization of New and Regression Test Cases. 3.1 Introduction

Chapter 3. Requirement Based System Test Case Prioritization of New and Regression Test Cases. 3.1 Introduction Chapter 3 Requirement Based System Test Case Prioritization of New and Regression Test Cases 3.1 Introduction In this chapter a new prioritization technique has been proposed with two new prioritization

More information

Software design simulation for quick and qualitative application development

Software design simulation for quick and qualitative application development IJCSNS International Journal of Computer Science and Network Security, Vol.9, No.8, August 2009 89 Software design simulation for quick and qualitative application development P.K. Suri 1 Gurdev Singh

More information

UML and the Cost of Defects

UML and the Cost of Defects UML and the of s Stephen J Mellor stephen_mellor@mentor.com It is common knowledge that software defects, especially in embedded systems, are expensive to repair; less well appreciated is just how very

More information

System and Software Architecture Description (SSAD) ThrdPlace Social Networking. Team 07

System and Software Architecture Description (SSAD) ThrdPlace Social Networking. Team 07 System and Software Architecture Description (SSAD) ThrdPlace Social Networking Team 07 Gaurav Doon - Project Manager Yixiang Liu - Developer Tu Duong IV&Ver and QFP Kan Qi - Developer Ronghui Zhang -

More information

Modularization and Software Architectures

Modularization and Software Architectures Modularization and Software Architectures 1 Software Architecture Analysis Method (SAAM) 2 Selection of relevant criteria in SAAM (I) We consider the quality criterion adaptability as an example. A software

More information

FAMIS 2014 Reporting Industry Certifications 6/16/2014

FAMIS 2014 Reporting Industry Certifications 6/16/2014 Purposes for Reporting Industry Certifications Reporting Industry Certifications Tara Goodman Sean Friend Division of Career and Adult Education CAPE Act Florida Education Finance Program (FEFP) School

More information

Educator Learning Journeys. Tracy Immel Global Director Teacher Professional Development Programs & Certification

Educator Learning Journeys. Tracy Immel Global Director Teacher Professional Development Programs & Certification Educator Learning Journeys Tracy Immel timmel@microsoft.com Global Director Teacher Professional Development Programs & Certification A Partnership Approach to Education Reform Set Vision and Define Priorities

More information

Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy. Miroslav Bures and Bestoun S. Ahmed

Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy. Miroslav Bures and Bestoun S. Ahmed 1 Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy Miroslav Bures and Bestoun S. Ahmed arxiv:1802.08005v1 [cs.se] 22 Feb 2018 Abstract Executing various sequences of system

More information

Department of Defense. Installation Energy Resilience

Department of Defense. Installation Energy Resilience Department of Defense Installation Energy Resilience Lisa A. Jung DASD (Installation Energy) OASD(Energy, Installations and Environment) 19 June 2018 Installation Energy is Energy that Powers Our Military

More information

Interrupts and real time

Interrupts and real time Page 1 of 7 Interrupts and real time Problem 1. A computer system has three devices whose characteristics are summarized in the following table: Device Service Time Interrupt Frequency Allowable Latency

More information

Introduction to ALM, UFT, VuGen, and LoadRunner

Introduction to ALM, UFT, VuGen, and LoadRunner Software Education Introduction to ALM, UFT, VuGen, and LoadRunner This course introduces students to the Application Lifecycle Management line products Introduction to ALM, UFT, VuGen, and LoadRunner

More information