Testing System Qualities
|
|
- Richard Jesse Turner
- 5 years ago
- Views:
Transcription
1 Testing System Qualities Rebecca Wirfs-Brock Joseph Yoder Copyright 2012 Rebecca Wirfs-Brock, Joseph Yoder, Wirfs-Brock Associates and The Refactory, Inc.
2 Introducing Rebecca President, Wirfs-Brock Associates Agile enthusiast (involved with experience reports since 1 st agile conference, board president Agile Open Northwest) First engineering job in Quality Assurance Pattern enthusiast, author, and Hillside Board Treasurer Old design geek (author of two object design books, inventor of Responsibility-Driven Design, advocate of CRC cards, hot spot cards, & other low-tech design tools, IEEE Software design columnist) Consults and trains top companies on agile architecture, responsiblity-driven design, enterprise app design, agile use cases, design storytelling, pragmatic testing Runs marathons!!!
3 Introducing Joseph Founder and Architect, The Refactory, Inc. Pattern enthusiast, author and Hillside Board President Author of the Big Ball of Mud Pattern Adaptive systems expert (programs adaptive software, consults on adaptive architectures, author of adaptive architecture patterns, metatdata maven, website: adaptiveobjectmodel.com) Agile enthusiast and practitioner Business owner (leads a world class development company) Consults and trains top companies on design, refactoring, pragmatic testing Amateur photographer, motorcycle enthusiast, enjoys dancing samba!!!
4 Some Agile Myths System Qualities can be added at the last moment. We can easily adapt to changing requirements (new requirements). You can change the system fast!!! Don t worry about the architecture.
5 Most testers spend the majority of their time writing functional tests BUT THERE S A LOT MORE TO TEST THAT YOUR SOFTWARE WORKS AS ADVERTISED
6 Pragmatic Testing Issues What kinds of testing should you focus on? Who writes them? Who runs them? When are they run? How are they run?
7 Testing System Qualities Qualities we could consider Usability Security Performance Scalability Internationalization Availability Flexibility Accessibility Location Regulation
8 Discussion What are the important qualities in your system?
9 Functional Tests vs. System Quality Tests Functional: How do I? Tests user stories work as advertised As a reviewer I want to add a note to a chart Compute the charge for an invoice Tests boundary conditions Can I add more than one note at the same place? Are excess charges computed correctly?
10 System Quality Tests How does the system handle? system load? number of add note transactions/minute under normal load system support for? simultaneously updating charts usability? ease of locating and selecting notes Tests that emphasize architecture capabilities and tangible system characteristics
11 Structure for A System Quality Acceptance Test
12 Specify Measurable Results Meter: An appropriate way to measure Scale: The values you expect Natural Scale: time in milliseconds Constructed: 1-10 ranking Proxy: Projecting throughput using sample data
13 Example Performance Scenario Source of Stimulus Users Stimulus Initiate order Artifact System Environment Normal conditions Transactions processed Measure Average latency of 2 seconds Users initiate 1,000 order transactions per minute under normal operations; transactions are processed with an average latency of 2 seconds.
14 Possible Performance Scenario Values Portion of Scenario Source Stimulus Artifact Environment Measure Possible Values External systems, users, components, databases Periodic events, sporadic or random events (or a combination) The system s services, data, or other resources The state the system can be in: normal, overloaded, partial operation, emergency mode Process the event or event sequence and possibly change the level of service Times it takes to process the arriving events (latency or deadline by which event must be processed), the variation in this time, the number of events that can be processed within a particular time interval, or a characterization of events that cannot be processed (missed rate, data loss)
15 Example Security Scenario Source of Stimulus Correctly identified individual Stimulus Tries to transfer money between accounts Artifact Data within the system Environment Normal operation System maintains audit trail Measure Correct data is restored within a day of reported event A known, authorized user transfers money between accounts. The user is later identified as an embezzler by the institution they belong to and the system then restores funds to the original account.
16 Possible Security Scenario Values Portion of Scenario Source Stimulus Artifact Environment Measure Possible Values A human or another system. May be identified (correctly or not) or be unknown. An attack or an attempt to break security by trying to display information, change information, access system services, or reduce system availability The system s services or data. The system might be online or offline, connected to or disconnected from the network, behind a firewall or open to the network. Authenticates user; hides identity of the user; blocks or allows access to data and/or services; records access/modification attempts by identity; stores data in encrypted format; recognizes unexplained high demand and informs a user or other system, or restricts availability. Time/effort/resources required to circumvent security measures with probability of success; probability of detecting attack; probability of identifying individual responsible for attack or access/modification; time/effort/resources to restore data/services; extent to which data/services are damaged and/or legitimate access denied.
17 Example Modifiability Scenario Source of Stimulus Developer Stimulus Artifact Add support UI, Source for new code, service Service code Code Table Environment Modification made with no schema changes Compile time, data definition Measure 2 days to code and test, 1 day to deploy A developer adds support for a new service code to the system by adding the service code to the definitions table and modifying the UI to make it available to users. The modification is made with no data schema changes
18 Possible Modifiability Scenario Values Portion of Scenario Source Stimulus Artifact Environment Measure Possible Values End user, developer, system administrator Wishes to add/delete/modify/vary functionality. Wishes to change some system quality such as availability, responsiveness, increasing capacity. What is to be changed: system user interface, platform, environment, or another system or API with which it interoperates When the change can be made: runtime, compile time, build time, when deployed, Locates places to be modified; makes modification without affecting other functionality; tests and deploys modification End user, developer, system administrator
19 Example Availability Scenario Source of Stimulus Unknown Sensor Stimulus Unexpected Report Artifact System Environment Normal conditions Record raw report in database and log event Measure No lost data An unknown sensor sends a report. The system stores the raw data in the unknown sensor database (to potentially be processed or purged later) and logs the event.
20 Example Usability Scenario Source of Stimulus End user Stimulus Cancel request Artifact System Environment At runtime System backs out pending transaction and releases resources Measure Cancel takes less than one second A user can cancel a pending request within two seconds.
21 Copyright 2012 Wirfs-Brock Associates and The Refactory
22 EXERCISES WRITE A QUALITY SCENARIO FOR A DATA COLLECTION AND ANALYSIS SYSTEM
23 Write A Quality Scenario Using the template handout, write a quality scenario. Be specific. Options: to data received from an unknown sensor. Adding new analyzer plug-ins. Relocating a sensor and being able to correlate data from its previous location (if desired). Detecting and troubleshooting equipment failures Detecting unusual weather conditions and incidents What quality does your scenario address?
24 You can t test warm and fuzzy It should be easy to place an online order TURN VAGUE STATEMENTS INTO CONCRETE MEASURABLE ACTIONS
25 Turning Warm Fuzzies into a Testable Usability Scenario Source of Stimulus Novice user Stimulus Place order Artifact System Environment Web interface with online help Order completed Measure Time to complete order entry task 80% of novice users should be able to place an order in under 3 minutes without assistance. or 80% of novice users should be able to place an order in under 3 minutes only using online help.
26 Agreeing on scenarios and target values
27 Some options Toss out a reasonable number, then discuss to come to a consensus Average informed individuals estimates Use an existing system as baseline Values for similar scenarios Benchmark working code
28 There is more than pass or fail Landing Zone: Lets you define a range of acceptable values Minimal: OK, we can live with that Target: Realistic goal, what we are aiming for Outstanding: This would be great, if everything goes well
29 Landing Zones Roll up product or project success to several key scenarios Easier to make sense of the bigger picture: What happens when one quality scenario edges below minimum? How do others trend? When will targets be achieved? At what cost?
30 Minimum Target Outstanding Performance Throughput (txns per day) 50,000 70,000 90,000 Average txn time 2 seconds 1 second < 1 second Data Quality Intersystem data consistency (per cent critical data attributes consistent) 95% 97% 97% Data accuracy 97% 99% >99% Managing Landing Zones Too many scenarios and you lose track of what s really important Define a core set, organize and group Roll up into aggregate scenarios Re-calibrate values as you implement more functionality be agile
31 Quality Testing Cycle for TDD Identify and Write Quality Scenarios Write Code and Tests Verify Quality Scenarios Clean up Code (Refactor/revise /rework) Ship it!!! Ready to Release? all tests succeed Check all Tests Succeed
32 Test Coverage Can Overlap Integration Tests Smoke Tests Quality Scenarios Acceptance Tests (Functional and qualities) Unit Tests
33 Pragmatic Test Driven Development Is Practical. Testing system qualities can fit into and enhance your current testing. Thoughtful. What qualities need to be tested? Who should write tests? When should you test for qualities? Realistic. You only have so much time and energy. Test essential qualities.
34 Summary Quality Scenarios are easy to write and read. Writing quality test scenarios drives out important cross-cutting concerns. If you don t pay attention to qualities they can be hard to achieve at the last moment. Measuring system qualities can require specialized testing/measurement tools.
35 Resources Agile Myths: agilemyths.com Wirfs-Brock Associates: The Refactory: Joe s website: joeyoder.com Our Pragmatic TDD Course: refactory.com/training/test-driven-development wirfs-brock.com/pragmatictestdrivendevelopment.html Landing Zone blogs: wirfs-brock.com/blog/2011/07/20/introducing-landing-zones/ wirfs-brock.com/blog/2011/08/16/who-defines-or-redefineslanding-zone-criteria/ wirfs-brock.com/blog/2011/08/05/landing-zone-targets-precisionspecificity-and-wiggle-room/ Introducing Pragmatic TDD: wirfs-brock.com/blog/2011/09/23/what-is-pragmatic-testing-all-about/
Traditional Classification of Requirements
Quality Attributes Traditional Classification of Requirements Functional Non-Functional (Quality Attributes) A popular software myth: first we build a software that satisfies functional requirements, then
More informationOverview. Consolidating SCM Infrastructures - Migrating between Tools -
- Migrating between Tools - Neal R. Firth, SageRight, Inc. An affiliate of Vizim Worldwide, Inc. 1 Overview Introduction Organizational Factors Business and People Product Factors Features and Usage The
More informationIntroduction to Architecture. Introduction to Architecture 1
Introduction to Architecture Introduction to Architecture 1 Content What is architecture? Motivation for architecture Non-functional requirements Introduction to Architecture 2 What is architecture? The
More informationClient-server application testing plan
Client-server application testing plan 1. INTRODUCTION The present plan contains and describes testing strategy principles applied for remote access system testing. The plan is intended to be used by project
More informationNow you can Microsoft Visual Studio 2010 with MSDN
Now you can Microsoft Visual Studio 2010 with MSDN gives your development teams the advanced functionality, superior benefits, and convenient access to the latest tools and resources they need to cost-effectively
More informationEvolutionary Architecture and Design
Evolutionary Architecture and Design Pradyumn Sharma pradyumn.sharma@pragatisoftware.com www.twitter.com/pradyumnsharma 1 What is Software Architecture? Structure of a system, comprising software elements,
More informationArchitecture and Design Evolution
Architecture and Design Evolution Pradyumn Sharma pradyumn.sharma@pragatisoftware.com www.twitter.com/pradyumnsharma 1 What is Software Architecture? Structure of a system, comprising software elements,
More informationArcSight Activate Framework
ArcSight Activate Framework Petropoulos #HPProtect 44% Have trouble managing their SIEM eiqnetworks 2013 SIEM Survey #1 challenge Identification of key events SANS 2012 Log Management and Event Management
More informationHOW TO DESIGN YOUR MOBILE APPS
HOW TO DESIGN YOUR MOBILE APPS HP HELSINKI 11 APRIL 2013 Creative Commons License How to design your mobile apps by Julian Harty is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported
More information9 myths about moving to the cloud. What small and medium-size businesses need to know about moving to Microsoft Office 365
9 myths about moving to the cloud What small and medium-size businesses need to know about moving to Microsoft Office 365 Most companies need the agility and cost savings that come with switching to Microsoft
More informationMaster Project. Refactoring the Legacy Code. Software Construction. EVU Master Thesis Aarhuus University
Software Construction Master Project EVU Master Thesis Aarhuus University 2013 06 09 Student: Carsten Sørensen (201200089) Teacher: Henrik B. Christensen Abstraction Over time, all code turns into legacy
More informationTHE USABILITY ENGINEERING LIFECYCLE: A PRACTITIONER'S HANDBOOK FOR USER INTERFACE DESIGN (INTERACTIVE TECHNOLOGIES) BY DEBORAH J.
Read Online and Download Ebook THE USABILITY ENGINEERING LIFECYCLE: A PRACTITIONER'S HANDBOOK FOR USER INTERFACE DESIGN (INTERACTIVE TECHNOLOGIES) BY DEBORAH J. MAYHEW DOWNLOAD EBOOK : THE USABILITY ENGINEERING
More informationTest Automation Strategies in Continuous Delivery. Nandan Shinde Test Automation Architect (Tech CoE) Cognizant Technology Solutions
Test Automation Strategies in Continuous Delivery Nandan Shinde Test Automation Architect (Tech CoE) Cognizant Technology Solutions The world of application is going through a monumental shift.. Evolving
More informationReal-Time & Big Data GIS: Best Practices. Josh Joyner Adam Mollenkopf
Real-Time & Big Data GIS: Best Practices Josh Joyner Adam Mollenkopf ArcGIS Enterprise with real-time capabilities Desktop Apps APIs live features stream services live & historic aggregates & features
More information3 Continuous Integration 3. Automated system finding bugs is better than people
This presentation is based upon a 3 day course I took from Jared Richardson. The examples and most of the tools presented are Java-centric, but there are equivalent tools for other languages or you can
More informationICAgile Learning Roadmap Agile Testing Track
ICAgile Learning Roadmap Agile Testing Track The work in this document was facilitated by the International Consortium for Agile (ICAgile) and done by the contribution of various Agile Experts and Practitioners.
More informationUpgrading to UrbanCode Deploy 7
Upgrading to UrbanCode Deploy 7 Published: February 19 th, 2019 {Contents} Introduction 2 Phase 1: Planning 3 1.1 Review help available from the UrbanCode team 3 1.2 Open a preemptive support ticket 3
More informationBuilding in Quality: The Beauty of Behavior Driven Development (BDD) Larry Apke - Agile Coach
Building in Quality: The Beauty of Behavior Driven Development (BDD) Larry Apke - Agile Coach Deming on Quality Quality comes not from inspection, but from improvement of the production process. We cannot
More informationPerformance Pack. Benchmarking with PlanetPress Connect and PReS Connect
Performance Pack Benchmarking with PlanetPress Connect and PReS Connect Contents 2 Introduction 4 Benchmarking results 5 First scenario: Print production on demand 5 Throughput vs. Output Speed 6 Second
More informationA developer s guide to load testing
Software architecture for developers What is software architecture? What is the role of a software architect? How do you define software architecture? How do you share software architecture? How do you
More informationThe Power of Unit Testing and it s impact on your business. Ashish Kumar Vice President, Engineering
The Power of Unit Testing and it s impact on your business Ashish Kumar Vice President, Engineering Agitar Software, 2006 1 The Power of Unit Testing Why Unit Test? The Practical Reality Where do we go
More informationInverting the Pyramid
Inverting the Pyramid Naresh Jain naresh@agilefaqs.com @nashjain http://nareshjain.com Time/Money/Opportunity Cost Plan Back in the Stone-age Happiness/Excitement Design Distribute Work in Isolation Integrate
More informationMIS Systems & Infrastructure Lifecycle Management 1. Week 12 April 7, 2016
MIS 5203 Lifecycle Management 1 Week 12 April 7, 2016 Study Objectives Systems Implementation Data Migration Change Over 2 Phase 1 Feasibility Phase 2 Requirements Which ones of these activities are part
More informationSoftware Design. Introduction. Software Design (Introduction) SERG
Software Design Introduction Software Design How to implement the what. Requirements Document (RD) is starting point. Software design is a highly-creative activity. Good designers are worth their weight
More informationSoftware Architecture
Software Architecture Architectural Design and Patterns. Standard Architectures. Dr. Philipp Leitner @xleitix University of Zurich, Switzerland software evolution & architecture lab Architecting, the planning
More informationIntroduction to software architecture Revision : 732
Introduction to software architecture Revision : 732 Denis Conan Septembre 2018 Foreword The content of these slides is extracted from the following references: L. Bass, P. Clements, and R. Kazman. Software
More informationTest-driven development
Test-driven development And how we do it at WIX Mantas Indrašius Software Engineer WIX.COM Agenda Tests overview Test-driven development (TDD) The Bowling Game demo Kickstarting a project using TDD How
More informationgoogle SEO UpdatE the RiSE Of NOt provided and hummingbird october 2013
google SEO Update The Rise of Not Provided and Hummingbird October 2013 Lead contributors David Freeman Head of SEO Havas Media UK david.freeman@havasmedia.com Winston Burton VP, Director of SEO Havas
More informationArchitectural Code Analysis. Using it in building Microservices NYC Cloud Expo 2017 (June 6-8)
Architectural Code Analysis Using it in building Microservices NYC Cloud Expo 2017 (June 6-8) Agenda Intro to Structural Analysis Challenges addressed during traditional software development The new world
More informationBDD and Testing. User requirements and testing are tightly coupled
BDD and Testing User requirements and testing are tightly coupled 1 New Concept: Acceptance Tests Customer criteria for accepting a milestone Get paid if pass! Black-box tests specified with the customer
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationTop-Down Network Design
Top-Down Network Design Chapter Two Analyzing Technical Goals and Tradeoffs Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Technical Goals Scalability Availability Performance Security Manageability
More informationAnalysis of the Test Driven Development by Example
Computer Science and Applications 1 (2013) 5-13 Aleksandar Bulajic and Radoslav Stojic The Faculty of Information Technology, Metropolitan University, Belgrade, 11000, Serbia Received: June 18, 2013 /
More informationStrategies for managing distributed IT environments. Anne-Marie Gignac Vice President Networking Solutions Schneider Electric
Strategies for managing distributed IT environments Anne-Marie Gignac Vice President Networking Solutions Schneider Electric APC by Schneider Electric Anne-Marie Gignac May 8, 2012 Agenda Trends & Challenges
More informationFinal Examination CS 111, Fall 2016 UCLA. Name:
Final Examination CS 111, Fall 2016 UCLA Name: This is an open book, open note test. You may use electronic devices to take the test, but may not access the network during the test. You have three hours
More informationKanban One-Day Workshop
Kanban One-Day Workshop Copyright Net Objectives, Inc. All Rights Reserved 2 Copyright Net Objectives, Inc. All Rights Reserved 3 Lean for Executives Product Portfolio Management Business Product Owner
More informationSOFTWARE ARCHITECTURE & DESIGN INTRODUCTION
SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,
More informationCONFERENCE PROCEEDINGS QUALITY CONFERENCE. Conference Paper Excerpt from the 28TH ANNUAL SOFTWARE. October 18th 19th, 2010
PACIFIC NW 28TH ANNUAL SOFTWARE QUALITY CONFERENCE October 18th 19th, 2010 Conference Paper Excerpt from the CONFERENCE PROCEEDINGS Permission to copy, without fee, all or part of this material, except
More informationAdvanced Security Tester Course Outline
Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,
More information+32 (491)
Whitepaper: Meraki wireless Title: Meraki MR16 tests Author: Jurgen Vermeulen Jurgen@juve-consulting.be +32 (491) 56.35.96 JUVE Consulting BVBA Roosgrachtlaan 27, B-3400 Landen Tel.: +32 (491) 56.35.96
More informationDEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER
DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration
More informationWEB-APIs DRIVING DIGITAL INNOVATION
WEB-APIs DRIVING DIGITAL INNOVATION Importance of Web-APIs Simply put, Web-APIs are the medium to make a company s digital assets consumable to any channel, which has a current or latent need. It helps
More informationParticipants. Results & Recommendations. Summary of Findings from User Study Round 3. Overall. Dashboard
Summary of Findings from User Study Round 3 Participants 6 people total 4 Product users Jay Nicole Chris Nic 2 Non Product users Karine (QB ProAdvisor) Ellen (pilot test) Results & Recommendations Overall
More informationMicrosoft SQL Server 2008 Reporting Services Unleashed Free Ebooks PDF
Microsoft SQL Server 2008 Reporting Services Unleashed Free Ebooks PDF Microsoft SQL Serverâ 2008 Reporting Services Unleashed  Michael Lisin Jim Joseph Amit Goyal  The authoritative, example-rich guide
More informationInterAct User. InterAct User (01/2011) Page 1
InterAct's Energy & Cost Analysis module provides users with a set of analytical reporting tools: Load Analysis Usage and Variance Analysis Trending Baseline Analysis Energy & Cost Benchmark What If Analysis
More informationJeffrey Friedberg. Chief Trust Architect Microsoft Corporation. July 12, 2010 Microsoft Corporation
Jeffrey Friedberg Chief Trust Architect Microsoft Corporation July 2, 200 Microsoft Corporation Secure against attacks Protects confidentiality, integrity and availability of data and systems Manageable
More informationSoftware Quality in a Modern Development Team. Presented by Timothy Bauguess and Marty Lewis
Software Quality in a Modern Development Team Presented by Timothy Bauguess and Marty Lewis High-Quality Software Who benefits? End users Development Stakeholders Components of Software Quality Structural
More informationBUILDING MICROSERVICES ON AZURE. ~ Vaibhav
BUILDING MICROSERVICES ON AZURE ~ Vaibhav Gujral @vabgujral About Me Over 11 years of experience Working with Assurant Inc. Microsoft Certified Azure Architect MCSD, MCP, Microsoft Specialist Aspiring
More informationAgile Testing in the Real World Moving Beyond Theory to Achieve Practicality [NEED PICTURE HERE]
Moving Beyond Theory to Achieve Practicality [NEED PICTURE HERE] There are lots of books, articles, and webinars about how great Agile is However, those often describe purist approaches that adhere to
More informationSample Exam. Advanced Test Automation - Engineer
Sample Exam Advanced Test Automation - Engineer Questions ASTQB Created - 2018 American Software Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,
More informationTurning a Marathon Runner into a Sprinter: Adopting Agile Testing Strategies and Practices at Microsoft
Turning a Marathon Runner into a Sprinter: Adopting Agile Testing Strategies and Practices at Microsoft Jean Hartmann Test Architect jeanhar@microsoft.com Overview Embracing Change Quality-related themes
More informationTest Driven Development (TDD), and Working with Legacy Code Using C# Workshop ( 4 days)
Test Driven Development (TDD), and Working with Legacy Code Using C# Workshop ( 4 days) HOTEL DUBAI GRAND April 16 to 19-2018 Monday to Thursday ) (4 days) 9 am to 4 pm ISIDUS TECH TEAM FZE PO Box 9798
More information10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
More informationAbout Dean Leffingwell
Lean Practices for Foreword by Don Nonfunctional (System Qualities) Agile Style Reinertsen Development Series By and Ryan Shriver Agile 2010 Orlando, FL Lean Practices for Foreword by Don Reinertsen Development
More informationHow Cisco IT Designed a Separate Network to Test Cisco Alpha Equipment
How Cisco IT Designed a Separate Network to Test Cisco Alpha Equipment Special production-level network tests and validates product behavior in a safe environment. / Routing and Switching / : This case
More informationFrequently Asked Questions
Frequently Asked Questions Page How do I select my Query?... 2 Someone told me I could personalize the Standard Queries and even create brand new Queries of my own, is that true?... 3 Saving Column Display:...
More informationCryptoEx: Applications for Encryption and Digital Signature
CryptoEx: Applications for Encryption and Digital Signature CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server
More informationWeb Service Testing for the New Digital Age
Web Service Testing for the New Digital Age Harish Auradkar Sr Quality Engineer Deepti Hippargi Sr Software Engineer Allscripts Abstract Most of the companies in the new digital age are adopting the web
More information"BEHAVIOR PATTERNS FOR DESIGNING AUTOMATED TESTS"
BIO PRESENTATION W3 5/16/2007 11:30:00 AM "BEHAVIOR PATTERNS FOR DESIGNING AUTOMATED TESTS" Jamie Mitchell Test & Automation Consulting LLC International Conference On Software Test Analysis And Review
More informationTABLE OF CONTENTS INTRODUCTION...3 MAIN ELEMENTS OF A PRODUCT ROADMAP...4 PRODUCT ROADMAPS...11 MARKETING ROADMAPS...27 ABOUT PRODUCTPLAN...
TABLE OF CONTENTS INTRODUCTION...3 MAIN ELEMENTS OF A PRODUCT ROADMAP...4 PRODUCT ROADMAPS...11 Product Roadmap Template... 12 Agile Roadmap Template... 13 Release Plan Template... 14 Portfolio Roadmap
More informationEnabling Performance & Stress Test throughout the Application Lifecycle
Enabling Performance & Stress Test throughout the Application Lifecycle March 2010 Poor application performance costs companies millions of dollars and their reputation every year. The simple challenge
More informationThe Paperless Classroom with Google Docs by - Eric Curts
The Paperless Classroom with Google Docs by - Eric Curts Table of Contents Overview How to name documents and folders How to choose sharing options: Edit, Comment, and View How to share a document with
More informationDesign and Information Hiding
Design and Information Hiding 15-214: Foundations of Software Engineering Jonathan Aldrich Related Reading: D. L. Parnas. On the Criteria To Be Used in Decomposing Systems into Modules. CACM 15(12):1053-1058,
More informationSOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS
WHITE PAPER SOFTWARE DEFINED STORAGE VS. TRADITIONAL SAN AND NAS This white paper describes, from a storage vendor perspective, the major differences between Software Defined Storage and traditional SAN
More informationSecurity Management Models And Practices Feb 5, 2008
TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related
More informationRead & Download (PDF Kindle) Microsoft SQL Server 2008 Administrator's Pocket Consultant
Read & Download (PDF Kindle) Microsoft SQL Server 2008 Administrator's Pocket Consultant From the author and series editor of the immensely popular ADMINISTRATOR'S POCKET CONSULTANT series from Microsoft
More informationWENDIA ITSM EXPERT TALK
WENDIA ITSM EXPERT TALK What to consider when implementing a Self Service Portal A WHITE PAPER BY MEXON TECHNOLOGY 1. Introduction The world of Service Management is, as ever rapidly changing. The IT Service
More informationResponsibility Driven Design
Responsibility Driven Design Responsibility Driven Design, Rebecca Wirfs Brock, 1990 The Coffee Machine Design Problem, Alistair Cockburn, C/C++ User's Journal, May and June 1998. Introducing Object-Oriented
More informationASTQB Advance Test Analyst Sample Exam Answer Key and Rationale
ASTQB Advance Test Analyst Sample Exam Answer Key and Rationale Total number points = 120 points Total number points to pass = 78 points Question Answer Explanation / Rationale Learning 1 A A is correct.
More informationThe Value of Using Name-Value Pairs
The Value of Using Name-Value Pairs Operations and Coverage Subcommittee Jesus Galvez z/tpf Development Disclaimer Any reference to future plans are for planning purposes only. IBM reserves the right to
More informationGUIDE. MetaDefender Kiosk Deployment Guide
GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect
More informationThe SD-WAN security guide
The SD-WAN security guide How a flexible, software-defined WAN can help protect your network, people and data SD-WAN security: Separating fact from fiction For many companies, the benefits of SD-WAN are
More informationJob Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.1
Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.1 December 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22
More informationThe Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It
The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:
More informationBUILDING WEB APPLICATIONS WITH VISUAL STUDIO 2017: USING.NET CORE AND MODERN JAVASCRIPT FRAMEWORKS BY PHILIP JAPIKSE, BEN DEWEY, KEVIN G
Read Online and Download Ebook BUILDING WEB APPLICATIONS WITH VISUAL STUDIO 2017: USING.NET CORE AND MODERN JAVASCRIPT FRAMEWORKS BY PHILIP JAPIKSE, BEN DEWEY, KEVIN G DOWNLOAD EBOOK : BUILDING WEB APPLICATIONS
More informationTest Driven Development (TDD)
Test Driven Development (TDD) Test Driven Development Introduction Good programmers write code, great programmers write tests Never, in the field of programming, have so many owed so much to so few - Martin
More informationA Risk Management Platform
A Risk Management Platform Michael Lai CISSP, CISA, MBA, MSc, BEng(hons) Territory Manager & Senior Security Sales Engineer Shift to Risk-Based Security OLD MODEL: Prevention-Based Security Prevention
More informationSegregating Data Within Databases for Performance Prepared by Bill Hulsizer
Segregating Data Within Databases for Performance Prepared by Bill Hulsizer When designing databases, segregating data within tables is usually important and sometimes very important. The higher the volume
More informationMICROSOFT VISUAL STUDIO 2010 Overview
MICROSOFT VISUAL STUDIO 2010 Overview Visual studio 2010 delivers the following key ADVANCES: Enabling emerging trends Every year the industry develops new technologies and new trends. With Visual Studio
More informationChapter 3: Google Penguin, Panda, & Hummingbird
Chapter 3: Google Penguin, Panda, & Hummingbird Search engine algorithms are based on a simple premise: searchers want an answer to their queries. For any search, there are hundreds or thousands of sites
More informationUtilizing Fast Testing to Transform Java Development into an Agile, Quick Release, Low Risk Process
Utilizing Fast Testing to Transform Java Development into an Agile, Quick Release, Low Risk Process Introduction System tests, often called slow tests, play a crucial role in nearly every Java development
More informationWHITE PAPER. Good Mobile Intranet Technical Overview
WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet
More informationCareful What You Wish For: Poor Colocation Design Could Cost You. Thorough assessment of upfront costs to prevent future system failures
Careful What You Wish For: Poor Colocation Design Could Cost You Thorough assessment of upfront costs to prevent future system failures Introduction While IT professionals often disagree on design and
More informationAssurance Features and Navigation
Assurance Features and Navigation Cisco DNA Center 1.1.2 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
More informationSharePoint 2010 Tutorial
SharePoint 2010 Tutorial TABLE OF CONTENTS Introduction... 1 Basic Navigation... 2 Navigation Buttons & Bars... 3 Ribbon... 4 Library Ribbon... 6 Recycle Bin... 7 Permission Levels & Groups... 8 Create
More informationAdam Shostack Microsoft
Adam Shostack Microsoft Mandatory process at Microsoft Covers development from conception to shipping & updates Includes threat modeling during design phase 2008 Microsoft 2008 Microsoft All engineers
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationFollow this Quick Guide to start using your Deeper START
Follow this Quick Guide to start using your Deeper START Thank you for purchasing a new Deeper START smart fishfinder. We hope you enjoy it. These instructions will enable you to prepare your device and
More informationRouterCheck Installation and Usage
RouterCheck Installation and Usage February 16, 2015 No part of this document may be reproduced, copied, or distributed in any fashion without the express written permission of Sericon Technology Inc.
More informationChapter 8 Software Testing. Chapter 8 Software testing
Chapter 8 Software Testing 1 Topics covered Introduction to testing Stages for testing software system are: Development testing Release testing User testing Test-driven development as interleave approach.
More informationHow your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter
How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...
More informationLESSONS LEARNED: BEING AGILE IN THE WATERFALL SANDBOX
www.twitter.com/telerik www.facebook.com/telerik LESSONS LEARNED: BEING AGILE IN THE WATERFALL SANDBOX Philip Japikse (@skimedic) phil.japikse@telerik.com www.skimedic.com/blog MVP, MCSD.Net, MCDBA, CSM,
More informationSnort: The World s Most Widely Deployed IPS Technology
Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,
More informationIBM Best Practices Working With Multiple CCM Applications Draft
Best Practices Working With Multiple CCM Applications. This document collects best practices to work with Multiple CCM applications in large size enterprise deployment topologies. Please see Best Practices
More informationProxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking
NETWORK MANAGEMENT II Proxy Servers Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking resources from the other
More informationWe turn hard problems into great software.
We turn hard problems into great software. We are passionate individuals focused on crafting impactful solutions to our clients most complex problems. CPO and Cofounder Ingrid Alongi 2 We Develop Applications
More informationMoving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing.
Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing. Overview The desire to use tools to increase validation productivity with the consequent
More informationStory Writing Basics
Jimi Fosdick, PMP, CST Agile Process Mentor jfosdick@collab.net 503.248.0800 Story Writing Basics [A user story is] a promise for a future conversation -Alistair Cockburn 1 Welcome Welcome to our ScrumCore
More informationAchieving Right Automation Balance in Agile Projects
Achieving Right Automation Balance in Agile Projects Vijayagopal Narayanan Vijayagopal.n@cognizant.com Abstract When is testing complete and How much testing is sufficient is a fundamental questions that
More informationFS Future Serie. FS-Thermoscan. User s manual
FS Future Serie FS-Thermoscan 8 User s manual User s manual: FS-Thermoscan 2 Any information contained in these operating instructions may be changed without prior notice. OKM does not make any warranty
More information