Testing System Qualities

Size: px
Start display at page:

Download "Testing System Qualities"

Transcription

1 Testing System Qualities Rebecca Wirfs-Brock Joseph Yoder Copyright 2012 Rebecca Wirfs-Brock, Joseph Yoder, Wirfs-Brock Associates and The Refactory, Inc.

2 Introducing Rebecca President, Wirfs-Brock Associates Agile enthusiast (involved with experience reports since 1 st agile conference, board president Agile Open Northwest) First engineering job in Quality Assurance Pattern enthusiast, author, and Hillside Board Treasurer Old design geek (author of two object design books, inventor of Responsibility-Driven Design, advocate of CRC cards, hot spot cards, & other low-tech design tools, IEEE Software design columnist) Consults and trains top companies on agile architecture, responsiblity-driven design, enterprise app design, agile use cases, design storytelling, pragmatic testing Runs marathons!!!

3 Introducing Joseph Founder and Architect, The Refactory, Inc. Pattern enthusiast, author and Hillside Board President Author of the Big Ball of Mud Pattern Adaptive systems expert (programs adaptive software, consults on adaptive architectures, author of adaptive architecture patterns, metatdata maven, website: adaptiveobjectmodel.com) Agile enthusiast and practitioner Business owner (leads a world class development company) Consults and trains top companies on design, refactoring, pragmatic testing Amateur photographer, motorcycle enthusiast, enjoys dancing samba!!!

4 Some Agile Myths System Qualities can be added at the last moment. We can easily adapt to changing requirements (new requirements). You can change the system fast!!! Don t worry about the architecture.

5 Most testers spend the majority of their time writing functional tests BUT THERE S A LOT MORE TO TEST THAT YOUR SOFTWARE WORKS AS ADVERTISED

6 Pragmatic Testing Issues What kinds of testing should you focus on? Who writes them? Who runs them? When are they run? How are they run?

7 Testing System Qualities Qualities we could consider Usability Security Performance Scalability Internationalization Availability Flexibility Accessibility Location Regulation

8 Discussion What are the important qualities in your system?

9 Functional Tests vs. System Quality Tests Functional: How do I? Tests user stories work as advertised As a reviewer I want to add a note to a chart Compute the charge for an invoice Tests boundary conditions Can I add more than one note at the same place? Are excess charges computed correctly?

10 System Quality Tests How does the system handle? system load? number of add note transactions/minute under normal load system support for? simultaneously updating charts usability? ease of locating and selecting notes Tests that emphasize architecture capabilities and tangible system characteristics

11 Structure for A System Quality Acceptance Test

12 Specify Measurable Results Meter: An appropriate way to measure Scale: The values you expect Natural Scale: time in milliseconds Constructed: 1-10 ranking Proxy: Projecting throughput using sample data

13 Example Performance Scenario Source of Stimulus Users Stimulus Initiate order Artifact System Environment Normal conditions Transactions processed Measure Average latency of 2 seconds Users initiate 1,000 order transactions per minute under normal operations; transactions are processed with an average latency of 2 seconds.

14 Possible Performance Scenario Values Portion of Scenario Source Stimulus Artifact Environment Measure Possible Values External systems, users, components, databases Periodic events, sporadic or random events (or a combination) The system s services, data, or other resources The state the system can be in: normal, overloaded, partial operation, emergency mode Process the event or event sequence and possibly change the level of service Times it takes to process the arriving events (latency or deadline by which event must be processed), the variation in this time, the number of events that can be processed within a particular time interval, or a characterization of events that cannot be processed (missed rate, data loss)

15 Example Security Scenario Source of Stimulus Correctly identified individual Stimulus Tries to transfer money between accounts Artifact Data within the system Environment Normal operation System maintains audit trail Measure Correct data is restored within a day of reported event A known, authorized user transfers money between accounts. The user is later identified as an embezzler by the institution they belong to and the system then restores funds to the original account.

16 Possible Security Scenario Values Portion of Scenario Source Stimulus Artifact Environment Measure Possible Values A human or another system. May be identified (correctly or not) or be unknown. An attack or an attempt to break security by trying to display information, change information, access system services, or reduce system availability The system s services or data. The system might be online or offline, connected to or disconnected from the network, behind a firewall or open to the network. Authenticates user; hides identity of the user; blocks or allows access to data and/or services; records access/modification attempts by identity; stores data in encrypted format; recognizes unexplained high demand and informs a user or other system, or restricts availability. Time/effort/resources required to circumvent security measures with probability of success; probability of detecting attack; probability of identifying individual responsible for attack or access/modification; time/effort/resources to restore data/services; extent to which data/services are damaged and/or legitimate access denied.

17 Example Modifiability Scenario Source of Stimulus Developer Stimulus Artifact Add support UI, Source for new code, service Service code Code Table Environment Modification made with no schema changes Compile time, data definition Measure 2 days to code and test, 1 day to deploy A developer adds support for a new service code to the system by adding the service code to the definitions table and modifying the UI to make it available to users. The modification is made with no data schema changes

18 Possible Modifiability Scenario Values Portion of Scenario Source Stimulus Artifact Environment Measure Possible Values End user, developer, system administrator Wishes to add/delete/modify/vary functionality. Wishes to change some system quality such as availability, responsiveness, increasing capacity. What is to be changed: system user interface, platform, environment, or another system or API with which it interoperates When the change can be made: runtime, compile time, build time, when deployed, Locates places to be modified; makes modification without affecting other functionality; tests and deploys modification End user, developer, system administrator

19 Example Availability Scenario Source of Stimulus Unknown Sensor Stimulus Unexpected Report Artifact System Environment Normal conditions Record raw report in database and log event Measure No lost data An unknown sensor sends a report. The system stores the raw data in the unknown sensor database (to potentially be processed or purged later) and logs the event.

20 Example Usability Scenario Source of Stimulus End user Stimulus Cancel request Artifact System Environment At runtime System backs out pending transaction and releases resources Measure Cancel takes less than one second A user can cancel a pending request within two seconds.

21 Copyright 2012 Wirfs-Brock Associates and The Refactory

22 EXERCISES WRITE A QUALITY SCENARIO FOR A DATA COLLECTION AND ANALYSIS SYSTEM

23 Write A Quality Scenario Using the template handout, write a quality scenario. Be specific. Options: to data received from an unknown sensor. Adding new analyzer plug-ins. Relocating a sensor and being able to correlate data from its previous location (if desired). Detecting and troubleshooting equipment failures Detecting unusual weather conditions and incidents What quality does your scenario address?

24 You can t test warm and fuzzy It should be easy to place an online order TURN VAGUE STATEMENTS INTO CONCRETE MEASURABLE ACTIONS

25 Turning Warm Fuzzies into a Testable Usability Scenario Source of Stimulus Novice user Stimulus Place order Artifact System Environment Web interface with online help Order completed Measure Time to complete order entry task 80% of novice users should be able to place an order in under 3 minutes without assistance. or 80% of novice users should be able to place an order in under 3 minutes only using online help.

26 Agreeing on scenarios and target values

27 Some options Toss out a reasonable number, then discuss to come to a consensus Average informed individuals estimates Use an existing system as baseline Values for similar scenarios Benchmark working code

28 There is more than pass or fail Landing Zone: Lets you define a range of acceptable values Minimal: OK, we can live with that Target: Realistic goal, what we are aiming for Outstanding: This would be great, if everything goes well

29 Landing Zones Roll up product or project success to several key scenarios Easier to make sense of the bigger picture: What happens when one quality scenario edges below minimum? How do others trend? When will targets be achieved? At what cost?

30 Minimum Target Outstanding Performance Throughput (txns per day) 50,000 70,000 90,000 Average txn time 2 seconds 1 second < 1 second Data Quality Intersystem data consistency (per cent critical data attributes consistent) 95% 97% 97% Data accuracy 97% 99% >99% Managing Landing Zones Too many scenarios and you lose track of what s really important Define a core set, organize and group Roll up into aggregate scenarios Re-calibrate values as you implement more functionality be agile

31 Quality Testing Cycle for TDD Identify and Write Quality Scenarios Write Code and Tests Verify Quality Scenarios Clean up Code (Refactor/revise /rework) Ship it!!! Ready to Release? all tests succeed Check all Tests Succeed

32 Test Coverage Can Overlap Integration Tests Smoke Tests Quality Scenarios Acceptance Tests (Functional and qualities) Unit Tests

33 Pragmatic Test Driven Development Is Practical. Testing system qualities can fit into and enhance your current testing. Thoughtful. What qualities need to be tested? Who should write tests? When should you test for qualities? Realistic. You only have so much time and energy. Test essential qualities.

34 Summary Quality Scenarios are easy to write and read. Writing quality test scenarios drives out important cross-cutting concerns. If you don t pay attention to qualities they can be hard to achieve at the last moment. Measuring system qualities can require specialized testing/measurement tools.

35 Resources Agile Myths: agilemyths.com Wirfs-Brock Associates: The Refactory: Joe s website: joeyoder.com Our Pragmatic TDD Course: refactory.com/training/test-driven-development wirfs-brock.com/pragmatictestdrivendevelopment.html Landing Zone blogs: wirfs-brock.com/blog/2011/07/20/introducing-landing-zones/ wirfs-brock.com/blog/2011/08/16/who-defines-or-redefineslanding-zone-criteria/ wirfs-brock.com/blog/2011/08/05/landing-zone-targets-precisionspecificity-and-wiggle-room/ Introducing Pragmatic TDD: wirfs-brock.com/blog/2011/09/23/what-is-pragmatic-testing-all-about/

Traditional Classification of Requirements

Traditional Classification of Requirements Quality Attributes Traditional Classification of Requirements Functional Non-Functional (Quality Attributes) A popular software myth: first we build a software that satisfies functional requirements, then

More information

Overview. Consolidating SCM Infrastructures - Migrating between Tools -

Overview. Consolidating SCM Infrastructures - Migrating between Tools - - Migrating between Tools - Neal R. Firth, SageRight, Inc. An affiliate of Vizim Worldwide, Inc. 1 Overview Introduction Organizational Factors Business and People Product Factors Features and Usage The

More information

Introduction to Architecture. Introduction to Architecture 1

Introduction to Architecture. Introduction to Architecture 1 Introduction to Architecture Introduction to Architecture 1 Content What is architecture? Motivation for architecture Non-functional requirements Introduction to Architecture 2 What is architecture? The

More information

Client-server application testing plan

Client-server application testing plan Client-server application testing plan 1. INTRODUCTION The present plan contains and describes testing strategy principles applied for remote access system testing. The plan is intended to be used by project

More information

Now you can Microsoft Visual Studio 2010 with MSDN

Now you can Microsoft Visual Studio 2010 with MSDN Now you can Microsoft Visual Studio 2010 with MSDN gives your development teams the advanced functionality, superior benefits, and convenient access to the latest tools and resources they need to cost-effectively

More information

Evolutionary Architecture and Design

Evolutionary Architecture and Design Evolutionary Architecture and Design Pradyumn Sharma pradyumn.sharma@pragatisoftware.com www.twitter.com/pradyumnsharma 1 What is Software Architecture? Structure of a system, comprising software elements,

More information

Architecture and Design Evolution

Architecture and Design Evolution Architecture and Design Evolution Pradyumn Sharma pradyumn.sharma@pragatisoftware.com www.twitter.com/pradyumnsharma 1 What is Software Architecture? Structure of a system, comprising software elements,

More information

ArcSight Activate Framework

ArcSight Activate Framework ArcSight Activate Framework Petropoulos #HPProtect 44% Have trouble managing their SIEM eiqnetworks 2013 SIEM Survey #1 challenge Identification of key events SANS 2012 Log Management and Event Management

More information

HOW TO DESIGN YOUR MOBILE APPS

HOW TO DESIGN YOUR MOBILE APPS HOW TO DESIGN YOUR MOBILE APPS HP HELSINKI 11 APRIL 2013 Creative Commons License How to design your mobile apps by Julian Harty is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported

More information

9 myths about moving to the cloud. What small and medium-size businesses need to know about moving to Microsoft Office 365

9 myths about moving to the cloud. What small and medium-size businesses need to know about moving to Microsoft Office 365 9 myths about moving to the cloud What small and medium-size businesses need to know about moving to Microsoft Office 365 Most companies need the agility and cost savings that come with switching to Microsoft

More information

Master Project. Refactoring the Legacy Code. Software Construction. EVU Master Thesis Aarhuus University

Master Project. Refactoring the Legacy Code. Software Construction. EVU Master Thesis Aarhuus University Software Construction Master Project EVU Master Thesis Aarhuus University 2013 06 09 Student: Carsten Sørensen (201200089) Teacher: Henrik B. Christensen Abstraction Over time, all code turns into legacy

More information

THE USABILITY ENGINEERING LIFECYCLE: A PRACTITIONER'S HANDBOOK FOR USER INTERFACE DESIGN (INTERACTIVE TECHNOLOGIES) BY DEBORAH J.

THE USABILITY ENGINEERING LIFECYCLE: A PRACTITIONER'S HANDBOOK FOR USER INTERFACE DESIGN (INTERACTIVE TECHNOLOGIES) BY DEBORAH J. Read Online and Download Ebook THE USABILITY ENGINEERING LIFECYCLE: A PRACTITIONER'S HANDBOOK FOR USER INTERFACE DESIGN (INTERACTIVE TECHNOLOGIES) BY DEBORAH J. MAYHEW DOWNLOAD EBOOK : THE USABILITY ENGINEERING

More information

Test Automation Strategies in Continuous Delivery. Nandan Shinde Test Automation Architect (Tech CoE) Cognizant Technology Solutions

Test Automation Strategies in Continuous Delivery. Nandan Shinde Test Automation Architect (Tech CoE) Cognizant Technology Solutions Test Automation Strategies in Continuous Delivery Nandan Shinde Test Automation Architect (Tech CoE) Cognizant Technology Solutions The world of application is going through a monumental shift.. Evolving

More information

Real-Time & Big Data GIS: Best Practices. Josh Joyner Adam Mollenkopf

Real-Time & Big Data GIS: Best Practices. Josh Joyner Adam Mollenkopf Real-Time & Big Data GIS: Best Practices Josh Joyner Adam Mollenkopf ArcGIS Enterprise with real-time capabilities Desktop Apps APIs live features stream services live & historic aggregates & features

More information

3 Continuous Integration 3. Automated system finding bugs is better than people

3 Continuous Integration 3. Automated system finding bugs is better than people This presentation is based upon a 3 day course I took from Jared Richardson. The examples and most of the tools presented are Java-centric, but there are equivalent tools for other languages or you can

More information

ICAgile Learning Roadmap Agile Testing Track

ICAgile Learning Roadmap Agile Testing Track ICAgile Learning Roadmap Agile Testing Track The work in this document was facilitated by the International Consortium for Agile (ICAgile) and done by the contribution of various Agile Experts and Practitioners.

More information

Upgrading to UrbanCode Deploy 7

Upgrading to UrbanCode Deploy 7 Upgrading to UrbanCode Deploy 7 Published: February 19 th, 2019 {Contents} Introduction 2 Phase 1: Planning 3 1.1 Review help available from the UrbanCode team 3 1.2 Open a preemptive support ticket 3

More information

Building in Quality: The Beauty of Behavior Driven Development (BDD) Larry Apke - Agile Coach

Building in Quality: The Beauty of Behavior Driven Development (BDD) Larry Apke - Agile Coach Building in Quality: The Beauty of Behavior Driven Development (BDD) Larry Apke - Agile Coach Deming on Quality Quality comes not from inspection, but from improvement of the production process. We cannot

More information

Performance Pack. Benchmarking with PlanetPress Connect and PReS Connect

Performance Pack. Benchmarking with PlanetPress Connect and PReS Connect Performance Pack Benchmarking with PlanetPress Connect and PReS Connect Contents 2 Introduction 4 Benchmarking results 5 First scenario: Print production on demand 5 Throughput vs. Output Speed 6 Second

More information

A developer s guide to load testing

A developer s guide to load testing Software architecture for developers What is software architecture? What is the role of a software architect? How do you define software architecture? How do you share software architecture? How do you

More information

The Power of Unit Testing and it s impact on your business. Ashish Kumar Vice President, Engineering

The Power of Unit Testing and it s impact on your business. Ashish Kumar Vice President, Engineering The Power of Unit Testing and it s impact on your business Ashish Kumar Vice President, Engineering Agitar Software, 2006 1 The Power of Unit Testing Why Unit Test? The Practical Reality Where do we go

More information

Inverting the Pyramid

Inverting the Pyramid Inverting the Pyramid Naresh Jain naresh@agilefaqs.com @nashjain http://nareshjain.com Time/Money/Opportunity Cost Plan Back in the Stone-age Happiness/Excitement Design Distribute Work in Isolation Integrate

More information

MIS Systems & Infrastructure Lifecycle Management 1. Week 12 April 7, 2016

MIS Systems & Infrastructure Lifecycle Management 1. Week 12 April 7, 2016 MIS 5203 Lifecycle Management 1 Week 12 April 7, 2016 Study Objectives Systems Implementation Data Migration Change Over 2 Phase 1 Feasibility Phase 2 Requirements Which ones of these activities are part

More information

Software Design. Introduction. Software Design (Introduction) SERG

Software Design. Introduction. Software Design (Introduction) SERG Software Design Introduction Software Design How to implement the what. Requirements Document (RD) is starting point. Software design is a highly-creative activity. Good designers are worth their weight

More information

Software Architecture

Software Architecture Software Architecture Architectural Design and Patterns. Standard Architectures. Dr. Philipp Leitner @xleitix University of Zurich, Switzerland software evolution & architecture lab Architecting, the planning

More information

Introduction to software architecture Revision : 732

Introduction to software architecture Revision : 732 Introduction to software architecture Revision : 732 Denis Conan Septembre 2018 Foreword The content of these slides is extracted from the following references: L. Bass, P. Clements, and R. Kazman. Software

More information

Test-driven development

Test-driven development Test-driven development And how we do it at WIX Mantas Indrašius Software Engineer WIX.COM Agenda Tests overview Test-driven development (TDD) The Bowling Game demo Kickstarting a project using TDD How

More information

google SEO UpdatE the RiSE Of NOt provided and hummingbird october 2013

google SEO UpdatE the RiSE Of NOt provided and hummingbird october 2013 google SEO Update The Rise of Not Provided and Hummingbird October 2013 Lead contributors David Freeman Head of SEO Havas Media UK david.freeman@havasmedia.com Winston Burton VP, Director of SEO Havas

More information

Architectural Code Analysis. Using it in building Microservices NYC Cloud Expo 2017 (June 6-8)

Architectural Code Analysis. Using it in building Microservices NYC Cloud Expo 2017 (June 6-8) Architectural Code Analysis Using it in building Microservices NYC Cloud Expo 2017 (June 6-8) Agenda Intro to Structural Analysis Challenges addressed during traditional software development The new world

More information

BDD and Testing. User requirements and testing are tightly coupled

BDD and Testing. User requirements and testing are tightly coupled BDD and Testing User requirements and testing are tightly coupled 1 New Concept: Acceptance Tests Customer criteria for accepting a milestone Get paid if pass! Black-box tests specified with the customer

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Two Analyzing Technical Goals and Tradeoffs Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Technical Goals Scalability Availability Performance Security Manageability

More information

Analysis of the Test Driven Development by Example

Analysis of the Test Driven Development by Example Computer Science and Applications 1 (2013) 5-13 Aleksandar Bulajic and Radoslav Stojic The Faculty of Information Technology, Metropolitan University, Belgrade, 11000, Serbia Received: June 18, 2013 /

More information

Strategies for managing distributed IT environments. Anne-Marie Gignac Vice President Networking Solutions Schneider Electric

Strategies for managing distributed IT environments. Anne-Marie Gignac Vice President Networking Solutions Schneider Electric Strategies for managing distributed IT environments Anne-Marie Gignac Vice President Networking Solutions Schneider Electric APC by Schneider Electric Anne-Marie Gignac May 8, 2012 Agenda Trends & Challenges

More information

Final Examination CS 111, Fall 2016 UCLA. Name:

Final Examination CS 111, Fall 2016 UCLA. Name: Final Examination CS 111, Fall 2016 UCLA Name: This is an open book, open note test. You may use electronic devices to take the test, but may not access the network during the test. You have three hours

More information

Kanban One-Day Workshop

Kanban One-Day Workshop Kanban One-Day Workshop Copyright Net Objectives, Inc. All Rights Reserved 2 Copyright Net Objectives, Inc. All Rights Reserved 3 Lean for Executives Product Portfolio Management Business Product Owner

More information

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,

More information

CONFERENCE PROCEEDINGS QUALITY CONFERENCE. Conference Paper Excerpt from the 28TH ANNUAL SOFTWARE. October 18th 19th, 2010

CONFERENCE PROCEEDINGS QUALITY CONFERENCE. Conference Paper Excerpt from the 28TH ANNUAL SOFTWARE. October 18th 19th, 2010 PACIFIC NW 28TH ANNUAL SOFTWARE QUALITY CONFERENCE October 18th 19th, 2010 Conference Paper Excerpt from the CONFERENCE PROCEEDINGS Permission to copy, without fee, all or part of this material, except

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

+32 (491)

+32 (491) Whitepaper: Meraki wireless Title: Meraki MR16 tests Author: Jurgen Vermeulen Jurgen@juve-consulting.be +32 (491) 56.35.96 JUVE Consulting BVBA Roosgrachtlaan 27, B-3400 Landen Tel.: +32 (491) 56.35.96

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

WEB-APIs DRIVING DIGITAL INNOVATION

WEB-APIs DRIVING DIGITAL INNOVATION WEB-APIs DRIVING DIGITAL INNOVATION Importance of Web-APIs Simply put, Web-APIs are the medium to make a company s digital assets consumable to any channel, which has a current or latent need. It helps

More information

Participants. Results & Recommendations. Summary of Findings from User Study Round 3. Overall. Dashboard

Participants. Results & Recommendations. Summary of Findings from User Study Round 3. Overall. Dashboard Summary of Findings from User Study Round 3 Participants 6 people total 4 Product users Jay Nicole Chris Nic 2 Non Product users Karine (QB ProAdvisor) Ellen (pilot test) Results & Recommendations Overall

More information

Microsoft SQL Server 2008 Reporting Services Unleashed Free Ebooks PDF

Microsoft SQL Server 2008 Reporting Services Unleashed Free Ebooks PDF Microsoft SQL Server 2008 Reporting Services Unleashed Free Ebooks PDF Microsoft SQL Serverâ 2008 Reporting Services Unleashed  Michael Lisin Jim Joseph Amit Goyal  The authoritative, example-rich guide

More information

InterAct User. InterAct User (01/2011) Page 1

InterAct User. InterAct User (01/2011) Page 1 InterAct's Energy & Cost Analysis module provides users with a set of analytical reporting tools: Load Analysis Usage and Variance Analysis Trending Baseline Analysis Energy & Cost Benchmark What If Analysis

More information

Jeffrey Friedberg. Chief Trust Architect Microsoft Corporation. July 12, 2010 Microsoft Corporation

Jeffrey Friedberg. Chief Trust Architect Microsoft Corporation. July 12, 2010 Microsoft Corporation Jeffrey Friedberg Chief Trust Architect Microsoft Corporation July 2, 200 Microsoft Corporation Secure against attacks Protects confidentiality, integrity and availability of data and systems Manageable

More information

Software Quality in a Modern Development Team. Presented by Timothy Bauguess and Marty Lewis

Software Quality in a Modern Development Team. Presented by Timothy Bauguess and Marty Lewis Software Quality in a Modern Development Team Presented by Timothy Bauguess and Marty Lewis High-Quality Software Who benefits? End users Development Stakeholders Components of Software Quality Structural

More information

BUILDING MICROSERVICES ON AZURE. ~ Vaibhav

BUILDING MICROSERVICES ON AZURE. ~ Vaibhav BUILDING MICROSERVICES ON AZURE ~ Vaibhav Gujral @vabgujral About Me Over 11 years of experience Working with Assurant Inc. Microsoft Certified Azure Architect MCSD, MCP, Microsoft Specialist Aspiring

More information

Agile Testing in the Real World Moving Beyond Theory to Achieve Practicality [NEED PICTURE HERE]

Agile Testing in the Real World Moving Beyond Theory to Achieve Practicality [NEED PICTURE HERE] Moving Beyond Theory to Achieve Practicality [NEED PICTURE HERE] There are lots of books, articles, and webinars about how great Agile is However, those often describe purist approaches that adhere to

More information

Sample Exam. Advanced Test Automation - Engineer

Sample Exam. Advanced Test Automation - Engineer Sample Exam Advanced Test Automation - Engineer Questions ASTQB Created - 2018 American Software Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,

More information

Turning a Marathon Runner into a Sprinter: Adopting Agile Testing Strategies and Practices at Microsoft

Turning a Marathon Runner into a Sprinter: Adopting Agile Testing Strategies and Practices at Microsoft Turning a Marathon Runner into a Sprinter: Adopting Agile Testing Strategies and Practices at Microsoft Jean Hartmann Test Architect jeanhar@microsoft.com Overview Embracing Change Quality-related themes

More information

Test Driven Development (TDD), and Working with Legacy Code Using C# Workshop ( 4 days)

Test Driven Development (TDD), and Working with Legacy Code Using C# Workshop ( 4 days) Test Driven Development (TDD), and Working with Legacy Code Using C# Workshop ( 4 days) HOTEL DUBAI GRAND April 16 to 19-2018 Monday to Thursday ) (4 days) 9 am to 4 pm ISIDUS TECH TEAM FZE PO Box 9798

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

About Dean Leffingwell

About Dean Leffingwell Lean Practices for Foreword by Don Nonfunctional (System Qualities) Agile Style Reinertsen Development Series By and Ryan Shriver Agile 2010 Orlando, FL Lean Practices for Foreword by Don Reinertsen Development

More information

How Cisco IT Designed a Separate Network to Test Cisco Alpha Equipment

How Cisco IT Designed a Separate Network to Test Cisco Alpha Equipment How Cisco IT Designed a Separate Network to Test Cisco Alpha Equipment Special production-level network tests and validates product behavior in a safe environment. / Routing and Switching / : This case

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Page How do I select my Query?... 2 Someone told me I could personalize the Standard Queries and even create brand new Queries of my own, is that true?... 3 Saving Column Display:...

More information

CryptoEx: Applications for Encryption and Digital Signature

CryptoEx: Applications for Encryption and Digital Signature CryptoEx: Applications for Encryption and Digital Signature CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server

More information

Web Service Testing for the New Digital Age

Web Service Testing for the New Digital Age Web Service Testing for the New Digital Age Harish Auradkar Sr Quality Engineer Deepti Hippargi Sr Software Engineer Allscripts Abstract Most of the companies in the new digital age are adopting the web

More information

"BEHAVIOR PATTERNS FOR DESIGNING AUTOMATED TESTS"

BEHAVIOR PATTERNS FOR DESIGNING AUTOMATED TESTS BIO PRESENTATION W3 5/16/2007 11:30:00 AM "BEHAVIOR PATTERNS FOR DESIGNING AUTOMATED TESTS" Jamie Mitchell Test & Automation Consulting LLC International Conference On Software Test Analysis And Review

More information

TABLE OF CONTENTS INTRODUCTION...3 MAIN ELEMENTS OF A PRODUCT ROADMAP...4 PRODUCT ROADMAPS...11 MARKETING ROADMAPS...27 ABOUT PRODUCTPLAN...

TABLE OF CONTENTS INTRODUCTION...3 MAIN ELEMENTS OF A PRODUCT ROADMAP...4 PRODUCT ROADMAPS...11 MARKETING ROADMAPS...27 ABOUT PRODUCTPLAN... TABLE OF CONTENTS INTRODUCTION...3 MAIN ELEMENTS OF A PRODUCT ROADMAP...4 PRODUCT ROADMAPS...11 Product Roadmap Template... 12 Agile Roadmap Template... 13 Release Plan Template... 14 Portfolio Roadmap

More information

Enabling Performance & Stress Test throughout the Application Lifecycle

Enabling Performance & Stress Test throughout the Application Lifecycle Enabling Performance & Stress Test throughout the Application Lifecycle March 2010 Poor application performance costs companies millions of dollars and their reputation every year. The simple challenge

More information

The Paperless Classroom with Google Docs by - Eric Curts

The Paperless Classroom with Google Docs by - Eric Curts The Paperless Classroom with Google Docs by - Eric Curts Table of Contents Overview How to name documents and folders How to choose sharing options: Edit, Comment, and View How to share a document with

More information

Design and Information Hiding

Design and Information Hiding Design and Information Hiding 15-214: Foundations of Software Engineering Jonathan Aldrich Related Reading: D. L. Parnas. On the Criteria To Be Used in Decomposing Systems into Modules. CACM 15(12):1053-1058,

More information

SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS

SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS WHITE PAPER SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS This white paper describes, from a storage vendor perspective, the major differences between Software Defined Storage and traditional SAN

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

Read & Download (PDF Kindle) Microsoft SQL Server 2008 Administrator's Pocket Consultant

Read & Download (PDF Kindle) Microsoft SQL Server 2008 Administrator's Pocket Consultant Read & Download (PDF Kindle) Microsoft SQL Server 2008 Administrator's Pocket Consultant From the author and series editor of the immensely popular ADMINISTRATOR'S POCKET CONSULTANT series from Microsoft

More information

WENDIA ITSM EXPERT TALK

WENDIA ITSM EXPERT TALK WENDIA ITSM EXPERT TALK What to consider when implementing a Self Service Portal A WHITE PAPER BY MEXON TECHNOLOGY 1. Introduction The world of Service Management is, as ever rapidly changing. The IT Service

More information

Responsibility Driven Design

Responsibility Driven Design Responsibility Driven Design Responsibility Driven Design, Rebecca Wirfs Brock, 1990 The Coffee Machine Design Problem, Alistair Cockburn, C/C++ User's Journal, May and June 1998. Introducing Object-Oriented

More information

ASTQB Advance Test Analyst Sample Exam Answer Key and Rationale

ASTQB Advance Test Analyst Sample Exam Answer Key and Rationale ASTQB Advance Test Analyst Sample Exam Answer Key and Rationale Total number points = 120 points Total number points to pass = 78 points Question Answer Explanation / Rationale Learning 1 A A is correct.

More information

The Value of Using Name-Value Pairs

The Value of Using Name-Value Pairs The Value of Using Name-Value Pairs Operations and Coverage Subcommittee Jesus Galvez z/tpf Development Disclaimer Any reference to future plans are for planning purposes only. IBM reserves the right to

More information

GUIDE. MetaDefender Kiosk Deployment Guide

GUIDE. MetaDefender Kiosk Deployment Guide GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect

More information

The SD-WAN security guide

The SD-WAN security guide The SD-WAN security guide How a flexible, software-defined WAN can help protect your network, people and data SD-WAN security: Separating fact from fiction For many companies, the benefits of SD-WAN are

More information

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.1

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.1 Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.1 December 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22

More information

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:

More information

BUILDING WEB APPLICATIONS WITH VISUAL STUDIO 2017: USING.NET CORE AND MODERN JAVASCRIPT FRAMEWORKS BY PHILIP JAPIKSE, BEN DEWEY, KEVIN G

BUILDING WEB APPLICATIONS WITH VISUAL STUDIO 2017: USING.NET CORE AND MODERN JAVASCRIPT FRAMEWORKS BY PHILIP JAPIKSE, BEN DEWEY, KEVIN G Read Online and Download Ebook BUILDING WEB APPLICATIONS WITH VISUAL STUDIO 2017: USING.NET CORE AND MODERN JAVASCRIPT FRAMEWORKS BY PHILIP JAPIKSE, BEN DEWEY, KEVIN G DOWNLOAD EBOOK : BUILDING WEB APPLICATIONS

More information

Test Driven Development (TDD)

Test Driven Development (TDD) Test Driven Development (TDD) Test Driven Development Introduction Good programmers write code, great programmers write tests Never, in the field of programming, have so many owed so much to so few - Martin

More information

A Risk Management Platform

A Risk Management Platform A Risk Management Platform Michael Lai CISSP, CISA, MBA, MSc, BEng(hons) Territory Manager & Senior Security Sales Engineer Shift to Risk-Based Security OLD MODEL: Prevention-Based Security Prevention

More information

Segregating Data Within Databases for Performance Prepared by Bill Hulsizer

Segregating Data Within Databases for Performance Prepared by Bill Hulsizer Segregating Data Within Databases for Performance Prepared by Bill Hulsizer When designing databases, segregating data within tables is usually important and sometimes very important. The higher the volume

More information

MICROSOFT VISUAL STUDIO 2010 Overview

MICROSOFT VISUAL STUDIO 2010 Overview MICROSOFT VISUAL STUDIO 2010 Overview Visual studio 2010 delivers the following key ADVANCES: Enabling emerging trends Every year the industry develops new technologies and new trends. With Visual Studio

More information

Chapter 3: Google Penguin, Panda, & Hummingbird

Chapter 3: Google Penguin, Panda, & Hummingbird Chapter 3: Google Penguin, Panda, & Hummingbird Search engine algorithms are based on a simple premise: searchers want an answer to their queries. For any search, there are hundreds or thousands of sites

More information

Utilizing Fast Testing to Transform Java Development into an Agile, Quick Release, Low Risk Process

Utilizing Fast Testing to Transform Java Development into an Agile, Quick Release, Low Risk Process Utilizing Fast Testing to Transform Java Development into an Agile, Quick Release, Low Risk Process Introduction System tests, often called slow tests, play a crucial role in nearly every Java development

More information

WHITE PAPER. Good Mobile Intranet Technical Overview

WHITE PAPER. Good Mobile Intranet Technical Overview WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet

More information

Careful What You Wish For: Poor Colocation Design Could Cost You. Thorough assessment of upfront costs to prevent future system failures

Careful What You Wish For: Poor Colocation Design Could Cost You. Thorough assessment of upfront costs to prevent future system failures Careful What You Wish For: Poor Colocation Design Could Cost You Thorough assessment of upfront costs to prevent future system failures Introduction While IT professionals often disagree on design and

More information

Assurance Features and Navigation

Assurance Features and Navigation Assurance Features and Navigation Cisco DNA Center 1.1.2 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

SharePoint 2010 Tutorial

SharePoint 2010 Tutorial SharePoint 2010 Tutorial TABLE OF CONTENTS Introduction... 1 Basic Navigation... 2 Navigation Buttons & Bars... 3 Ribbon... 4 Library Ribbon... 6 Recycle Bin... 7 Permission Levels & Groups... 8 Create

More information

Adam Shostack Microsoft

Adam Shostack Microsoft Adam Shostack Microsoft Mandatory process at Microsoft Covers development from conception to shipping & updates Includes threat modeling during design phase 2008 Microsoft 2008 Microsoft All engineers

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

Follow this Quick Guide to start using your Deeper START

Follow this Quick Guide to start using your Deeper START Follow this Quick Guide to start using your Deeper START Thank you for purchasing a new Deeper START smart fishfinder. We hope you enjoy it. These instructions will enable you to prepare your device and

More information

RouterCheck Installation and Usage

RouterCheck Installation and Usage RouterCheck Installation and Usage February 16, 2015 No part of this document may be reproduced, copied, or distributed in any fashion without the express written permission of Sericon Technology Inc.

More information

Chapter 8 Software Testing. Chapter 8 Software testing

Chapter 8 Software Testing. Chapter 8 Software testing Chapter 8 Software Testing 1 Topics covered Introduction to testing Stages for testing software system are: Development testing Release testing User testing Test-driven development as interleave approach.

More information

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...

More information

LESSONS LEARNED: BEING AGILE IN THE WATERFALL SANDBOX

LESSONS LEARNED: BEING AGILE IN THE WATERFALL SANDBOX www.twitter.com/telerik www.facebook.com/telerik LESSONS LEARNED: BEING AGILE IN THE WATERFALL SANDBOX Philip Japikse (@skimedic) phil.japikse@telerik.com www.skimedic.com/blog MVP, MCSD.Net, MCDBA, CSM,

More information

Snort: The World s Most Widely Deployed IPS Technology

Snort: The World s Most Widely Deployed IPS Technology Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,

More information

IBM Best Practices Working With Multiple CCM Applications Draft

IBM Best Practices Working With Multiple CCM Applications Draft Best Practices Working With Multiple CCM Applications. This document collects best practices to work with Multiple CCM applications in large size enterprise deployment topologies. Please see Best Practices

More information

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking NETWORK MANAGEMENT II Proxy Servers Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking resources from the other

More information

We turn hard problems into great software.

We turn hard problems into great software. We turn hard problems into great software. We are passionate individuals focused on crafting impactful solutions to our clients most complex problems. CPO and Cofounder Ingrid Alongi 2 We Develop Applications

More information

Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing.

Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing. Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing. Overview The desire to use tools to increase validation productivity with the consequent

More information

Story Writing Basics

Story Writing Basics Jimi Fosdick, PMP, CST Agile Process Mentor jfosdick@collab.net 503.248.0800 Story Writing Basics [A user story is] a promise for a future conversation -Alistair Cockburn 1 Welcome Welcome to our ScrumCore

More information

Achieving Right Automation Balance in Agile Projects

Achieving Right Automation Balance in Agile Projects Achieving Right Automation Balance in Agile Projects Vijayagopal Narayanan Vijayagopal.n@cognizant.com Abstract When is testing complete and How much testing is sufficient is a fundamental questions that

More information

FS Future Serie. FS-Thermoscan. User s manual

FS Future Serie. FS-Thermoscan. User s manual FS Future Serie FS-Thermoscan 8 User s manual User s manual: FS-Thermoscan 2 Any information contained in these operating instructions may be changed without prior notice. OKM does not make any warranty

More information