SlideShare una empresa de Scribd logo
1 de 11
I have removed the company logo and part of the site title from all pages. The user supplies their username and password.
Here the user has entered an incorrect password and has been alerted of their mistake.
Upon successful login the user is presented with a list of issues that are being tracked by the system. If I had more than 3 issues in the system we would see the pagination options.
Next, we'll click the VIEW button to look at the details of this particular issue. We can filter the issues by a particular system (also filter on issue initiator, etc.), click the Apply Filter button and then view issues that fit our requirements. Here I have filtered on issues from the Weapons Systems that have been initiated by myself.
Here we are viewing the details for issue number 3. Some of the details shown here were entered when this issue was created and some of the fields become populated later as the user adds comments, etc.
We've now scrolled down the page a little to view the section of the page where I can add a comment to this particular issue. I can also change the status of the issue and assign the issue to a particular individual, I may want to assign the issue to a developer for example so that the problem can be addressed. I've added a comment, changed the issue status to ASSIGNED and I've assigned the issue to Nick Webnow. Next I would click the 'Submit the changes' button to make the changes.
We can see that the Status column is now showing that the status has changed. We have a single green dot when the issue has been assigned, two green dots when a fix for the issue is in progress and three green dots when the issue has been fixed.
Here I've deselected all of the filters so that I can view all of the issues. Next I'll click the VIEW button alongside issue number 3 again so that we can review the comments.
We can see the comment that I added to the issue. The system automatically adds my user name and the time and date at which I submitted the comment.
If the user does not interact with the system for more than one hour they are locked out of the system. This is a little security feature as I didn't want someone who was not a user of the system to sit at the workstation of the logged-in user and have access. A genuine user simply has to click a link to return to the login page where they can login again.
Once the user has logged out they are returned to the login page where a message informs them that they are logged out.

Más contenido relacionado

Destacado (17)

Torino proces - master studenti FEFA
Torino proces - master studenti FEFATorino proces - master studenti FEFA
Torino proces - master studenti FEFA
 
Horario 2012
Horario 2012Horario 2012
Horario 2012
 
Leaflet diet jantung AKPER PEMKAB MUNA
Leaflet diet jantung AKPER PEMKAB MUNA Leaflet diet jantung AKPER PEMKAB MUNA
Leaflet diet jantung AKPER PEMKAB MUNA
 
Plano de beneficios_ebserh_04122014
Plano de beneficios_ebserh_04122014Plano de beneficios_ebserh_04122014
Plano de beneficios_ebserh_04122014
 
Financing Your Students Education08
Financing Your Students Education08Financing Your Students Education08
Financing Your Students Education08
 
Ted slides
Ted slidesTed slides
Ted slides
 
Karma
Karma Karma
Karma
 
MBoban15CV
MBoban15CVMBoban15CV
MBoban15CV
 
Elearnigbancodeobjetos
ElearnigbancodeobjetosElearnigbancodeobjetos
Elearnigbancodeobjetos
 
IMG1
IMG1IMG1
IMG1
 
Ficha 07 autoconocerse
Ficha 07   autoconocerseFicha 07   autoconocerse
Ficha 07 autoconocerse
 
Webdesign, hovedprosjekt
Webdesign, hovedprosjektWebdesign, hovedprosjekt
Webdesign, hovedprosjekt
 
Voces Del Mas Allá
Voces Del Mas AlláVoces Del Mas Allá
Voces Del Mas Allá
 
Tareas quimica
Tareas quimicaTareas quimica
Tareas quimica
 
Attachments 2010 10_11
Attachments 2010 10_11Attachments 2010 10_11
Attachments 2010 10_11
 
Petroleo Argentino
Petroleo ArgentinoPetroleo Argentino
Petroleo Argentino
 
Jatin Joshi Resume
Jatin Joshi ResumeJatin Joshi Resume
Jatin Joshi Resume
 

Similar a Issue Tracker Show

How To Use Lead Generator
How To Use Lead GeneratorHow To Use Lead Generator
How To Use Lead Generator
guestcd97d2b
 
8 7 Nrbb Flow
8 7 Nrbb Flow8 7 Nrbb Flow
8 7 Nrbb Flow
websolve
 
Mobile VoIP Reseller Account generation
Mobile VoIP Reseller Account generationMobile VoIP Reseller Account generation
Mobile VoIP Reseller Account generation
STARSSIP LIMITED
 
View Solution #48 - Email- Active Directory - Samanage
View Solution #48 - Email- Active Directory - SamanageView Solution #48 - Email- Active Directory - Samanage
View Solution #48 - Email- Active Directory - Samanage
Andrew Peisner
 
Project report Rs Dry celaners
Project report Rs Dry celaners Project report Rs Dry celaners
Project report Rs Dry celaners
Nitesh Singh
 

Similar a Issue Tracker Show (20)

My Access Database
My Access DatabaseMy Access Database
My Access Database
 
How To Use Lead Generator
How To Use Lead GeneratorHow To Use Lead Generator
How To Use Lead Generator
 
Salesforce Create a Login Flow
Salesforce Create a Login FlowSalesforce Create a Login Flow
Salesforce Create a Login Flow
 
8 7 Nrbb Flow
8 7 Nrbb Flow8 7 Nrbb Flow
8 7 Nrbb Flow
 
How To Set Up Insightly CRM
How To Set Up Insightly CRMHow To Set Up Insightly CRM
How To Set Up Insightly CRM
 
Guideline for compliance watcher application
Guideline for compliance watcher applicationGuideline for compliance watcher application
Guideline for compliance watcher application
 
usecase
usecaseusecase
usecase
 
Intern-Report
Intern-ReportIntern-Report
Intern-Report
 
How to Add / Delete User in OpenERP
How to Add / Delete User in OpenERPHow to Add / Delete User in OpenERP
How to Add / Delete User in OpenERP
 
Users manual
Users manualUsers manual
Users manual
 
Moderator training
Moderator trainingModerator training
Moderator training
 
Mobile VoIP Reseller Account generation
Mobile VoIP Reseller Account generationMobile VoIP Reseller Account generation
Mobile VoIP Reseller Account generation
 
Clean up
Clean upClean up
Clean up
 
View Solution #48 - Email- Active Directory - Samanage
View Solution #48 - Email- Active Directory - SamanageView Solution #48 - Email- Active Directory - Samanage
View Solution #48 - Email- Active Directory - Samanage
 
Kbox 101 1000 slide
Kbox 101 1000 slideKbox 101 1000 slide
Kbox 101 1000 slide
 
Guide to Buffer
Guide to BufferGuide to Buffer
Guide to Buffer
 
Warehouse Configurator
Warehouse ConfiguratorWarehouse Configurator
Warehouse Configurator
 
Project report Rs Dry celaners
Project report Rs Dry celaners Project report Rs Dry celaners
Project report Rs Dry celaners
 
Spice works
Spice worksSpice works
Spice works
 
Ame setup po requisitions (1)
Ame setup   po requisitions (1)Ame setup   po requisitions (1)
Ame setup po requisitions (1)
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Issue Tracker Show

  • 1. I have removed the company logo and part of the site title from all pages. The user supplies their username and password.
  • 2. Here the user has entered an incorrect password and has been alerted of their mistake.
  • 3. Upon successful login the user is presented with a list of issues that are being tracked by the system. If I had more than 3 issues in the system we would see the pagination options.
  • 4. Next, we'll click the VIEW button to look at the details of this particular issue. We can filter the issues by a particular system (also filter on issue initiator, etc.), click the Apply Filter button and then view issues that fit our requirements. Here I have filtered on issues from the Weapons Systems that have been initiated by myself.
  • 5. Here we are viewing the details for issue number 3. Some of the details shown here were entered when this issue was created and some of the fields become populated later as the user adds comments, etc.
  • 6. We've now scrolled down the page a little to view the section of the page where I can add a comment to this particular issue. I can also change the status of the issue and assign the issue to a particular individual, I may want to assign the issue to a developer for example so that the problem can be addressed. I've added a comment, changed the issue status to ASSIGNED and I've assigned the issue to Nick Webnow. Next I would click the 'Submit the changes' button to make the changes.
  • 7. We can see that the Status column is now showing that the status has changed. We have a single green dot when the issue has been assigned, two green dots when a fix for the issue is in progress and three green dots when the issue has been fixed.
  • 8. Here I've deselected all of the filters so that I can view all of the issues. Next I'll click the VIEW button alongside issue number 3 again so that we can review the comments.
  • 9. We can see the comment that I added to the issue. The system automatically adds my user name and the time and date at which I submitted the comment.
  • 10. If the user does not interact with the system for more than one hour they are locked out of the system. This is a little security feature as I didn't want someone who was not a user of the system to sit at the workstation of the logged-in user and have access. A genuine user simply has to click a link to return to the login page where they can login again.
  • 11. Once the user has logged out they are returned to the login page where a message informs them that they are logged out.