SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Defect Management




                    1
Background: Maysinee
          Nakmanee                      By. Maysinee Nakmanee




Re-engineering Projects-Banking
Center of Software Engineering
Teaching/Guest Speaker for
public/private org.
Thompson-Reuters/Global
Development
– Global configuration management tool
– Global defect tracking tool
(current) DSTi- IFDS Group                       2

– International Financial Development
What is defect?
                                  By. Maysinee Nakmanee




Something wrong in the system
Can we live in the “defect-free” world?
What people can do to prevent the
defect?




                                           3
Defect/Bug Types
                                             By. Maysinee Nakmanee


Mild - misspell output, lack of white space
Moderate - output may be misleading or redundant
Annoying - users need tricks to get system to work
Disturbing - refuses to handle legitimate transaction
Serious - looses track of transaction and its
occurrence
Very serious - bug causes system to incorrect
transaction
Extreme - problem limited to a few user or a few
transaction type, frequent, and arbitrary
Intolerable -long term unrecoverable corruption of
database, system shutdown may need to occur
Infectious - corrupts other systems, system that 4
causes loss of life
Defect Management Process
                                          By. Maysinee Nakmanee



Refer to as “Incident Management Tools”

Prevent Defect
Find the defect as quickly as
possible
Should be
 – Impact analysis
 – Root-cause analysis
 – Improve the process


                                                   5
Defect Reporting
                                      By. Maysinee Nakmanee




Defects are recorded for four major
purpose
– Ensure defect is corrected
– Report status of the application
– Gather statistics used to develop defect
  expectation in future application
– To improve the software development
  process
                                               6
Defect Severity vs. Priority
                                       By. Maysinee Nakmanee



Severity: Defect may be defined as one
that causes data corruption or system crash,
security violation.




Priority: The order in which defects should
be fixed. It is more subjective as it may be
based on input from users regarding which
defects are most important, resources
available, risks.                               7
A sample defect tracking
                        process                              By. Maysinee Nakmanee


I. Run Test


     II. Log Defects


              III. Investigate
                   Defects


                             IV. Defect Resolution Process
                             1.   Priority the correction
                             2.   Schedule the correction
                             3.   Correct the defect
                             4.   Report the resolution
                                                               V. Report
                                                             the resolution
                                                                      8
By. Maysinee Nakmanee




         9
By. Maysinee Nakmanee




“Traceability”




                         10
Traceability of Requirement to
            Testing    By. Maysinee Nakmanee




Traceable from
–   Requirements
–   Planning
–   Development
–   Testing




                               11
Testing
               By. Maysinee Nakmanee




               Testing
             Unit Test
         System Test
     Regression Test
    Stabilization Test
User Acceptance Test
                       12
By. Maysinee Nakmanee




        13
Defect Information
                     By. Maysinee Nakmanee




            What is the
            defects
            Who found
            Who will fix
            In which
            area


                             14
Defect Type           By. Maysinee Nakmanee


        • When testers
          found the defects,
          we need to
          recheck first
          whether it is code
          issue or code
          related or not.
        • Sometimes, it may
          be defect from
          environment from
          data that has
          been conversed
                            15
          but not the code
Root cause of defects                     By. Maysinee Nakmanee




• The most important thing in defect management is to
  be able to identify the root cause of defect in order to
  prevent the future problem.

                                                         16
Priority of defects   By. Maysinee Nakmanee




                              17
Impacted Area
                  By. Maysinee Nakmanee




         Impact: Fix one
         part may affect to
         other parts. This
         may cause
         “Defective fix”
         defect.
         Review of
         impacted area is
         the most
         important before
                        18
         any resolution
Fix Defects
                                  By. Maysinee Nakmanee




Developer needs to provide
–   Resolution
–   When to finish the fix
–   Impacted area
–   Root cause of the defect
–   Unit test result of the fix
Tester needs to
– Re-assure the solution
– Re-test and Close the defect
                                          19
Fix Defects
                                   By. Maysinee Nakmanee




Would that be possible that some
defects have never been fixed?
What will affect to the system?
Why we do that?




                                           20
Defect Metrics
                 By. Maysinee Nakmanee




                         21
Defects Metrics
                                By. Maysinee Nakmanee




Phase Injected
Phase found
How many priority defects
How quick we can resolve the defects
Root cause of the defects
How long a defect has been openned

                                        22
Defect Management
                                    By. Maysinee Nakmanee




Collaboration between all parties
–   Developers
–   Testes
–   Business Analyst
–   System Analyst
Sometimes, Fix is a nice to have but
may not be a need to do

                                            23
Defects as requirements
                                  By. Maysinee Nakmanee




Collection of defects from previous
release/version can be come
requirements for next release.
– Production issue defects
– Minor defects




                                          24
Summary
                                      By. Maysinee Nakmanee




Defect management is the most important
process that all stakeholders need to aware
of.

Considering defect information to support
defect management.




                                              25

Weitere ähnliche Inhalte

Was ist angesagt?

software project management Software inspection
software project management Software inspectionsoftware project management Software inspection
software project management Software inspectionREHMAT ULLAH
 
Defect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect ManagementDefect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect Managementguest476528
 
Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Techpartnerz
 
From Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionFrom Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionSune Gynthersen
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!SQALab
 
Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!TechWell
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testingToshi Patel
 
Defect prevention techniques
Defect prevention techniquesDefect prevention techniques
Defect prevention techniquesZarko Acimovic
 
Risk-based Testing
Risk-based TestingRisk-based Testing
Risk-based TestingJohan Hoberg
 
Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Neil Thompson
 
Risks of Risk-Based Testing
Risks of Risk-Based TestingRisks of Risk-Based Testing
Risks of Risk-Based Testingrrice2000
 
Risk based testing - Final
Risk based testing - FinalRisk based testing - Final
Risk based testing - FinalKuldeep Kumar
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of DefectsDavid Gevorgyan
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software TestersTechWell
 
Fundamentals of Risk-based Testing
Fundamentals of Risk-based TestingFundamentals of Risk-based Testing
Fundamentals of Risk-based TestingTechWell
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods deep sharma
 

Was ist angesagt? (20)

software project management Software inspection
software project management Software inspectionsoftware project management Software inspection
software project management Software inspection
 
Defect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect ManagementDefect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect Management
 
Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3
 
Defect prevention
Defect preventionDefect prevention
Defect prevention
 
From Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionFrom Defect Reporting To Defect Prevention
From Defect Reporting To Defect Prevention
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!
 
Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testing
 
Defect prevention techniques
Defect prevention techniquesDefect prevention techniques
Defect prevention techniques
 
Risk-based Testing
Risk-based TestingRisk-based Testing
Risk-based Testing
 
Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)
 
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
 
Risks of Risk-Based Testing
Risks of Risk-Based TestingRisks of Risk-Based Testing
Risks of Risk-Based Testing
 
Risk based testing - Final
Risk based testing - FinalRisk based testing - Final
Risk based testing - Final
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of Defects
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software Testers
 
Fundamentals of Risk-based Testing
Fundamentals of Risk-based TestingFundamentals of Risk-based Testing
Fundamentals of Risk-based Testing
 
Test management
Test managementTest management
Test management
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods
 
Istqb chapter 5
Istqb chapter 5Istqb chapter 5
Istqb chapter 5
 

Ähnlich wie BugDay Bangkok 2009 Defect Management

Classic Testing Mistakes 0226
Classic Testing Mistakes 0226Classic Testing Mistakes 0226
Classic Testing Mistakes 0226MBA_Community
 
Tool Box Talk - Human Induced Failures 2
Tool Box Talk  - Human Induced Failures  2Tool Box Talk  - Human Induced Failures  2
Tool Box Talk - Human Induced Failures 2Ricky Smith CMRP, CMRT
 
Root cause analysis master plan
Root cause analysis master planRoot cause analysis master plan
Root cause analysis master planGlen Alleman
 
Dan Cornell - The Real Cost of Software Remediation
Dan Cornell  - The Real Cost of Software RemediationDan Cornell  - The Real Cost of Software Remediation
Dan Cornell - The Real Cost of Software RemediationSource Conference
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software RemediationDenim Group
 
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…Dario Spinola
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management Argyle Executive Forum
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptxsuresh667793
 
Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...vcuniversity
 
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudApica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudRightScale
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGrant Swanson
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment TechniquesDenim Group
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingCenzic
 
Reducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsReducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsWilde Analysis Ltd.
 
Performance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudPerformance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudRightScale
 
Yale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full SlidesYale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full Slidesssusercc0cac
 
Maintenance101_for_Linkedin
Maintenance101_for_LinkedinMaintenance101_for_Linkedin
Maintenance101_for_LinkedinDavid Trewartha
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedThomas Zimmermann
 

Ähnlich wie BugDay Bangkok 2009 Defect Management (20)

Classic Testing Mistakes 0226
Classic Testing Mistakes 0226Classic Testing Mistakes 0226
Classic Testing Mistakes 0226
 
Tool Box Talk - Human Induced Failures 2
Tool Box Talk  - Human Induced Failures  2Tool Box Talk  - Human Induced Failures  2
Tool Box Talk - Human Induced Failures 2
 
Root cause analysis master plan
Root cause analysis master planRoot cause analysis master plan
Root cause analysis master plan
 
Dan Cornell - The Real Cost of Software Remediation
Dan Cornell  - The Real Cost of Software RemediationDan Cornell  - The Real Cost of Software Remediation
Dan Cornell - The Real Cost of Software Remediation
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
 
The key to improving your availability is fracas
The key to improving your availability is fracasThe key to improving your availability is fracas
The key to improving your availability is fracas
 
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptx
 
Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...
 
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudApica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance Monitoring
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security Testing
 
Presentation2
Presentation2Presentation2
Presentation2
 
Reducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsReducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering Methods
 
Performance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudPerformance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the Cloud
 
Yale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full SlidesYale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full Slides
 
Maintenance101_for_Linkedin
Maintenance101_for_LinkedinMaintenance101_for_Linkedin
Maintenance101_for_Linkedin
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
 

Kürzlich hochgeladen

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Kürzlich hochgeladen (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

BugDay Bangkok 2009 Defect Management

  • 2. Background: Maysinee Nakmanee By. Maysinee Nakmanee Re-engineering Projects-Banking Center of Software Engineering Teaching/Guest Speaker for public/private org. Thompson-Reuters/Global Development – Global configuration management tool – Global defect tracking tool (current) DSTi- IFDS Group 2 – International Financial Development
  • 3. What is defect? By. Maysinee Nakmanee Something wrong in the system Can we live in the “defect-free” world? What people can do to prevent the defect? 3
  • 4. Defect/Bug Types By. Maysinee Nakmanee Mild - misspell output, lack of white space Moderate - output may be misleading or redundant Annoying - users need tricks to get system to work Disturbing - refuses to handle legitimate transaction Serious - looses track of transaction and its occurrence Very serious - bug causes system to incorrect transaction Extreme - problem limited to a few user or a few transaction type, frequent, and arbitrary Intolerable -long term unrecoverable corruption of database, system shutdown may need to occur Infectious - corrupts other systems, system that 4 causes loss of life
  • 5. Defect Management Process By. Maysinee Nakmanee Refer to as “Incident Management Tools” Prevent Defect Find the defect as quickly as possible Should be – Impact analysis – Root-cause analysis – Improve the process 5
  • 6. Defect Reporting By. Maysinee Nakmanee Defects are recorded for four major purpose – Ensure defect is corrected – Report status of the application – Gather statistics used to develop defect expectation in future application – To improve the software development process 6
  • 7. Defect Severity vs. Priority By. Maysinee Nakmanee Severity: Defect may be defined as one that causes data corruption or system crash, security violation. Priority: The order in which defects should be fixed. It is more subjective as it may be based on input from users regarding which defects are most important, resources available, risks. 7
  • 8. A sample defect tracking process By. Maysinee Nakmanee I. Run Test II. Log Defects III. Investigate Defects IV. Defect Resolution Process 1. Priority the correction 2. Schedule the correction 3. Correct the defect 4. Report the resolution V. Report the resolution 8
  • 11. Traceability of Requirement to Testing By. Maysinee Nakmanee Traceable from – Requirements – Planning – Development – Testing 11
  • 12. Testing By. Maysinee Nakmanee Testing Unit Test System Test Regression Test Stabilization Test User Acceptance Test 12
  • 14. Defect Information By. Maysinee Nakmanee What is the defects Who found Who will fix In which area 14
  • 15. Defect Type By. Maysinee Nakmanee • When testers found the defects, we need to recheck first whether it is code issue or code related or not. • Sometimes, it may be defect from environment from data that has been conversed 15 but not the code
  • 16. Root cause of defects By. Maysinee Nakmanee • The most important thing in defect management is to be able to identify the root cause of defect in order to prevent the future problem. 16
  • 17. Priority of defects By. Maysinee Nakmanee 17
  • 18. Impacted Area By. Maysinee Nakmanee Impact: Fix one part may affect to other parts. This may cause “Defective fix” defect. Review of impacted area is the most important before 18 any resolution
  • 19. Fix Defects By. Maysinee Nakmanee Developer needs to provide – Resolution – When to finish the fix – Impacted area – Root cause of the defect – Unit test result of the fix Tester needs to – Re-assure the solution – Re-test and Close the defect 19
  • 20. Fix Defects By. Maysinee Nakmanee Would that be possible that some defects have never been fixed? What will affect to the system? Why we do that? 20
  • 21. Defect Metrics By. Maysinee Nakmanee 21
  • 22. Defects Metrics By. Maysinee Nakmanee Phase Injected Phase found How many priority defects How quick we can resolve the defects Root cause of the defects How long a defect has been openned 22
  • 23. Defect Management By. Maysinee Nakmanee Collaboration between all parties – Developers – Testes – Business Analyst – System Analyst Sometimes, Fix is a nice to have but may not be a need to do 23
  • 24. Defects as requirements By. Maysinee Nakmanee Collection of defects from previous release/version can be come requirements for next release. – Production issue defects – Minor defects 24
  • 25. Summary By. Maysinee Nakmanee Defect management is the most important process that all stakeholders need to aware of. Considering defect information to support defect management. 25