SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
Defect Management




                    1
Background: Maysinee
          Nakmanee                      By. Maysinee Nakmanee




Re-engineering Projects-Banking
Center of Software Engineering
Teaching/Guest Speaker for
public/private org.
Thompson-Reuters/Global
Development
– Global configuration management tool
– Global defect tracking tool
(current) DSTi- IFDS Group                       2

– International Financial Development
What is defect?
                                  By. Maysinee Nakmanee




Something wrong in the system
Can we live in the “defect-free” world?
What people can do to prevent the
defect?




                                           3
Defect/Bug Types
                                             By. Maysinee Nakmanee


Mild - misspell output, lack of white space
Moderate - output may be misleading or redundant
Annoying - users need tricks to get system to work
Disturbing - refuses to handle legitimate transaction
Serious - looses track of transaction and its
occurrence
Very serious - bug causes system to incorrect
transaction
Extreme - problem limited to a few user or a few
transaction type, frequent, and arbitrary
Intolerable -long term unrecoverable corruption of
database, system shutdown may need to occur
Infectious - corrupts other systems, system that 4
causes loss of life
Defect Management Process
                                          By. Maysinee Nakmanee



Refer to as “Incident Management Tools”

Prevent Defect
Find the defect as quickly as
possible
Should be
 – Impact analysis
 – Root-cause analysis
 – Improve the process


                                                   5
Defect Reporting
                                      By. Maysinee Nakmanee




Defects are recorded for four major
purpose
– Ensure defect is corrected
– Report status of the application
– Gather statistics used to develop defect
  expectation in future application
– To improve the software development
  process
                                               6
Defect Severity vs. Priority
                                       By. Maysinee Nakmanee



Severity: Defect may be defined as one
that causes data corruption or system crash,
security violation.




Priority: The order in which defects should
be fixed. It is more subjective as it may be
based on input from users regarding which
defects are most important, resources
available, risks.                               7
A sample defect tracking
                        process                              By. Maysinee Nakmanee


I. Run Test


     II. Log Defects


              III. Investigate
                   Defects


                             IV. Defect Resolution Process
                             1.   Priority the correction
                             2.   Schedule the correction
                             3.   Correct the defect
                             4.   Report the resolution
                                                               V. Report
                                                             the resolution
                                                                      8
By. Maysinee Nakmanee




         9
By. Maysinee Nakmanee




“Traceability”




                         10
Traceability of Requirement to
            Testing    By. Maysinee Nakmanee




Traceable from
–   Requirements
–   Planning
–   Development
–   Testing




                               11
Testing
               By. Maysinee Nakmanee




               Testing
             Unit Test
         System Test
     Regression Test
    Stabilization Test
User Acceptance Test
                       12
By. Maysinee Nakmanee




        13
Defect Information
                     By. Maysinee Nakmanee




            What is the
            defects
            Who found
            Who will fix
            In which
            area


                             14
Defect Type           By. Maysinee Nakmanee


        • When testers
          found the defects,
          we need to
          recheck first
          whether it is code
          issue or code
          related or not.
        • Sometimes, it may
          be defect from
          environment from
          data that has
          been conversed
                            15
          but not the code
Root cause of defects                     By. Maysinee Nakmanee




• The most important thing in defect management is to
  be able to identify the root cause of defect in order to
  prevent the future problem.

                                                         16
Priority of defects   By. Maysinee Nakmanee




                              17
Impacted Area
                  By. Maysinee Nakmanee




         Impact: Fix one
         part may affect to
         other parts. This
         may cause
         “Defective fix”
         defect.
         Review of
         impacted area is
         the most
         important before
                        18
         any resolution
Fix Defects
                                  By. Maysinee Nakmanee




Developer needs to provide
–   Resolution
–   When to finish the fix
–   Impacted area
–   Root cause of the defect
–   Unit test result of the fix
Tester needs to
– Re-assure the solution
– Re-test and Close the defect
                                          19
Fix Defects
                                   By. Maysinee Nakmanee




Would that be possible that some
defects have never been fixed?
What will affect to the system?
Why we do that?




                                           20
Defect Metrics
                 By. Maysinee Nakmanee




                         21
Defects Metrics
                                By. Maysinee Nakmanee




Phase Injected
Phase found
How many priority defects
How quick we can resolve the defects
Root cause of the defects
How long a defect has been openned

                                        22
Defect Management
                                    By. Maysinee Nakmanee




Collaboration between all parties
–   Developers
–   Testes
–   Business Analyst
–   System Analyst
Sometimes, Fix is a nice to have but
may not be a need to do

                                            23
Defects as requirements
                                  By. Maysinee Nakmanee




Collection of defects from previous
release/version can be come
requirements for next release.
– Production issue defects
– Minor defects




                                          24
Summary
                                      By. Maysinee Nakmanee




Defect management is the most important
process that all stakeholders need to aware
of.

Considering defect information to support
defect management.




                                              25

Más contenido relacionado

La actualidad más candente

software project management Software inspection
software project management Software inspectionsoftware project management Software inspection
software project management Software inspectionREHMAT ULLAH
 
Defect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect ManagementDefect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect Managementguest476528
 
Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Techpartnerz
 
From Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionFrom Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionSune Gynthersen
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!SQALab
 
Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!TechWell
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testingToshi Patel
 
Defect prevention techniques
Defect prevention techniquesDefect prevention techniques
Defect prevention techniquesZarko Acimovic
 
Risk-based Testing
Risk-based TestingRisk-based Testing
Risk-based TestingJohan Hoberg
 
Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Neil Thompson
 
Risks of Risk-Based Testing
Risks of Risk-Based TestingRisks of Risk-Based Testing
Risks of Risk-Based Testingrrice2000
 
Risk based testing - Final
Risk based testing - FinalRisk based testing - Final
Risk based testing - FinalKuldeep Kumar
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of DefectsDavid Gevorgyan
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software TestersTechWell
 
Fundamentals of Risk-based Testing
Fundamentals of Risk-based TestingFundamentals of Risk-based Testing
Fundamentals of Risk-based TestingTechWell
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods deep sharma
 

La actualidad más candente (20)

software project management Software inspection
software project management Software inspectionsoftware project management Software inspection
software project management Software inspection
 
Defect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect ManagementDefect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect Management
 
Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3
 
Defect prevention
Defect preventionDefect prevention
Defect prevention
 
From Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionFrom Defect Reporting To Defect Prevention
From Defect Reporting To Defect Prevention
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!
 
Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testing
 
Defect prevention techniques
Defect prevention techniquesDefect prevention techniques
Defect prevention techniques
 
Risk-based Testing
Risk-based TestingRisk-based Testing
Risk-based Testing
 
Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)
 
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
 
Risks of Risk-Based Testing
Risks of Risk-Based TestingRisks of Risk-Based Testing
Risks of Risk-Based Testing
 
Risk based testing - Final
Risk based testing - FinalRisk based testing - Final
Risk based testing - Final
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of Defects
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software Testers
 
Fundamentals of Risk-based Testing
Fundamentals of Risk-based TestingFundamentals of Risk-based Testing
Fundamentals of Risk-based Testing
 
Test management
Test managementTest management
Test management
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods
 
Istqb chapter 5
Istqb chapter 5Istqb chapter 5
Istqb chapter 5
 

Similar a BugDay Bangkok 2009 Defect Management

Classic Testing Mistakes 0226
Classic Testing Mistakes 0226Classic Testing Mistakes 0226
Classic Testing Mistakes 0226MBA_Community
 
Tool Box Talk - Human Induced Failures 2
Tool Box Talk  - Human Induced Failures  2Tool Box Talk  - Human Induced Failures  2
Tool Box Talk - Human Induced Failures 2Ricky Smith CMRP, CMRT
 
Root cause analysis master plan
Root cause analysis master planRoot cause analysis master plan
Root cause analysis master planGlen Alleman
 
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…Dario Spinola
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management Argyle Executive Forum
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptxsuresh667793
 
Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...vcuniversity
 
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudApica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudRightScale
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGrant Swanson
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment TechniquesDenim Group
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingCenzic
 
Reducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsReducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsWilde Analysis Ltd.
 
Performance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudPerformance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudRightScale
 
Yale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full SlidesYale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full Slidesssusercc0cac
 
Maintenance101_for_Linkedin
Maintenance101_for_LinkedinMaintenance101_for_Linkedin
Maintenance101_for_LinkedinDavid Trewartha
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedThomas Zimmermann
 
Fault management presentation
Fault management presentationFault management presentation
Fault management presentationardhita banu adji
 
FMEA-Training.pptx
FMEA-Training.pptxFMEA-Training.pptx
FMEA-Training.pptxssuser8fd336
 

Similar a BugDay Bangkok 2009 Defect Management (20)

Classic Testing Mistakes 0226
Classic Testing Mistakes 0226Classic Testing Mistakes 0226
Classic Testing Mistakes 0226
 
Tool Box Talk - Human Induced Failures 2
Tool Box Talk  - Human Induced Failures  2Tool Box Talk  - Human Induced Failures  2
Tool Box Talk - Human Induced Failures 2
 
Root cause analysis master plan
Root cause analysis master planRoot cause analysis master plan
Root cause analysis master plan
 
The key to improving your availability is fracas
The key to improving your availability is fracasThe key to improving your availability is fracas
The key to improving your availability is fracas
 
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptx
 
Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...
 
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudApica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance Monitoring
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security Testing
 
Presentation2
Presentation2Presentation2
Presentation2
 
Reducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsReducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering Methods
 
Performance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudPerformance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the Cloud
 
Yale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full SlidesYale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full Slides
 
Maintenance101_for_Linkedin
Maintenance101_for_LinkedinMaintenance101_for_Linkedin
Maintenance101_for_Linkedin
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
 
Fault management presentation
Fault management presentationFault management presentation
Fault management presentation
 
FMEA-Training.pptx
FMEA-Training.pptxFMEA-Training.pptx
FMEA-Training.pptx
 

Último

Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 

Último (20)

Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 

BugDay Bangkok 2009 Defect Management

  • 2. Background: Maysinee Nakmanee By. Maysinee Nakmanee Re-engineering Projects-Banking Center of Software Engineering Teaching/Guest Speaker for public/private org. Thompson-Reuters/Global Development – Global configuration management tool – Global defect tracking tool (current) DSTi- IFDS Group 2 – International Financial Development
  • 3. What is defect? By. Maysinee Nakmanee Something wrong in the system Can we live in the “defect-free” world? What people can do to prevent the defect? 3
  • 4. Defect/Bug Types By. Maysinee Nakmanee Mild - misspell output, lack of white space Moderate - output may be misleading or redundant Annoying - users need tricks to get system to work Disturbing - refuses to handle legitimate transaction Serious - looses track of transaction and its occurrence Very serious - bug causes system to incorrect transaction Extreme - problem limited to a few user or a few transaction type, frequent, and arbitrary Intolerable -long term unrecoverable corruption of database, system shutdown may need to occur Infectious - corrupts other systems, system that 4 causes loss of life
  • 5. Defect Management Process By. Maysinee Nakmanee Refer to as “Incident Management Tools” Prevent Defect Find the defect as quickly as possible Should be – Impact analysis – Root-cause analysis – Improve the process 5
  • 6. Defect Reporting By. Maysinee Nakmanee Defects are recorded for four major purpose – Ensure defect is corrected – Report status of the application – Gather statistics used to develop defect expectation in future application – To improve the software development process 6
  • 7. Defect Severity vs. Priority By. Maysinee Nakmanee Severity: Defect may be defined as one that causes data corruption or system crash, security violation. Priority: The order in which defects should be fixed. It is more subjective as it may be based on input from users regarding which defects are most important, resources available, risks. 7
  • 8. A sample defect tracking process By. Maysinee Nakmanee I. Run Test II. Log Defects III. Investigate Defects IV. Defect Resolution Process 1. Priority the correction 2. Schedule the correction 3. Correct the defect 4. Report the resolution V. Report the resolution 8
  • 11. Traceability of Requirement to Testing By. Maysinee Nakmanee Traceable from – Requirements – Planning – Development – Testing 11
  • 12. Testing By. Maysinee Nakmanee Testing Unit Test System Test Regression Test Stabilization Test User Acceptance Test 12
  • 14. Defect Information By. Maysinee Nakmanee What is the defects Who found Who will fix In which area 14
  • 15. Defect Type By. Maysinee Nakmanee • When testers found the defects, we need to recheck first whether it is code issue or code related or not. • Sometimes, it may be defect from environment from data that has been conversed 15 but not the code
  • 16. Root cause of defects By. Maysinee Nakmanee • The most important thing in defect management is to be able to identify the root cause of defect in order to prevent the future problem. 16
  • 17. Priority of defects By. Maysinee Nakmanee 17
  • 18. Impacted Area By. Maysinee Nakmanee Impact: Fix one part may affect to other parts. This may cause “Defective fix” defect. Review of impacted area is the most important before 18 any resolution
  • 19. Fix Defects By. Maysinee Nakmanee Developer needs to provide – Resolution – When to finish the fix – Impacted area – Root cause of the defect – Unit test result of the fix Tester needs to – Re-assure the solution – Re-test and Close the defect 19
  • 20. Fix Defects By. Maysinee Nakmanee Would that be possible that some defects have never been fixed? What will affect to the system? Why we do that? 20
  • 21. Defect Metrics By. Maysinee Nakmanee 21
  • 22. Defects Metrics By. Maysinee Nakmanee Phase Injected Phase found How many priority defects How quick we can resolve the defects Root cause of the defects How long a defect has been openned 22
  • 23. Defect Management By. Maysinee Nakmanee Collaboration between all parties – Developers – Testes – Business Analyst – System Analyst Sometimes, Fix is a nice to have but may not be a need to do 23
  • 24. Defects as requirements By. Maysinee Nakmanee Collection of defects from previous release/version can be come requirements for next release. – Production issue defects – Minor defects 24
  • 25. Summary By. Maysinee Nakmanee Defect management is the most important process that all stakeholders need to aware of. Considering defect information to support defect management. 25