SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Finally… Reliable
Software!
Bryan Bakker
Eindhoven 2015
bryan.bakker@sioux.eu
@Bryan_Bakker
Contents
 Intro
 Reliability
 Four step model
 Different steps in detail
 Conclusion
© Sioux 2015 | Confidential | 2
Thanks
Thanks to:
 Rob de Bie
 René van den Eertwegh
 Peter Wijnhoven
© Sioux 2015 | Confidential | 3
About Bryan Bakker
 Test Expert
 Certifications: ISTQB, TMap, Prince2
 Member of ISTQB Expert Level on Test Automation
 Tutor of several test related courses
 Domains: medical systems, professional security
systems, semi-industry, electron microscopy
 Specialties: test automation, integration testing, design
for testability, reliability testing
© Sioux 2015 | Confidential | 4
About Sioux
HERENTALS
NUENEN
EINDHOVEN
UTRECHT MOSCOW
© Sioux 2015 | Confidential | 5
DANANG
 Did you ever experience unreliable software?
Reliability
© Sioux 2015 | Confidential | 6
Reliability
 What is reliability?
“Software Reliability is the probability of failure-
free software operation in a specified
environment for a specified period of time.”
IEEE 729
In short:
 Something can be functional correct
 But is it reliable? © Sioux 2015 | Confidential | 7
Reliability
 What is reliability?
“Software Reliability is the probability of failure-
free software operation in a specified
environment for a specified period of time.”
IEEE 729
In short:
 Something can be functional correct
 But is it reliable? How reliable is it? © Sioux 2015 | Confidential | 8
Four steps
© Sioux 2015 | Confidential | 9
Example: Security and Surveillance System
 Cameras
 Recording
 Event Handling
Define user domain reliability targets:
 Define customer profiles
 Identify operation modes and critical
functions
 Determine reliability requirements per
operation mode / critical function
First step
© Sioux 2015 | Confidential | 10
 Define customer profiles
 ATM security
First step
© Sioux 2015 | Confidential | 11
 Define customer profiles
 ATM security
 Parking lot surveillance
First step
© Sioux 2015 | Confidential | 12
 Define customer profiles
 ATM security
 Parking lot surveillance
 Airport surveillance
First step
© Sioux 2015 | Confidential | 13
 Identify operation modes and critical
functions
 Recording mode
 Playback mode
 Auto-start (critical)
 Out-of-the-box
 User triggered
 Software reset
First step
© Sioux 2015 | Confidential | 14
 Determine reliability requirements per
operation mode / critical function
 Segment between 0.5s and 2s missed
 failure rate ≤1x per day
 Playback command does not function as expected
 failure rate ≤ 1x per hour of viewing
 Not auto-started  failure rate ≤ 3 * 10-7
failures/restart
First step
© Sioux 2015 | Confidential | 15
 Define operational profile for
user functions
 Decompose software reliability targets
 Decompose operational profile with
probabilities per component
Second step
© Sioux 2015 | Confidential | 16
 How will the product be used by
customers?
 Focus development resources based
on expected usage
 Operational profile: a quantitative
characterization of how a system will be used
 Developed by John Musa
 To be used for development and test
activities
 Also very useful for reliability
Operational profile
© Sioux 2015 | Confidential | 17
 Critical functions can be missed in
operational profiles.
 Treat them separately!
What about?
© Sioux 2015 | Confidential | 18
 Define operational profile for
user functions
Second step
© Sioux 2015 | Confidential | 19
 Decompose software reliability targets
 Not auto-started  failure rate <= 3 * 10-7
failures/restart
 Stream Handler contribution: 20%
 “Target” = 0.6 * 10-7 failures / restart
Second step
© Sioux 2015 | Confidential | 20
Focus on Stream
Handler
component
 Decompose operational profile with
probabilities per component
Second step
© Sioux 2015 | Confidential | 21
Playback function Occurrence Probability % Stream Handler commands
Play / Pause (toggle) 48 out of 100 48% Start / Stop Playback
Fast forward 20 out of 100 20% Start Playback
Fast reverse 20 out of 100 20% Start Playback
Setup playback
windows
10 out of 100 10% Stop / Start Playback
Search and select
event for playback
2 out of 100 2% Start Playback with time
stamp = time of selected
event
 Define the engineering processes
 Process steps to prevent reliability
faults
 Process steps to detect reliability faults
 Design choices to minimize effects of faults
Next steps
© Sioux 2015 | Confidential | 22
 Measure software reliability growth
 Design and execute reliability tests
 Based on the operational profiles
 Randomly execute test set according to the
operation profile
 Extra focus on critical functions
 Visualize reliability growths
Next steps
© Sioux 2015 | Confidential | 23
 Reliability growth curve
Next steps
© Sioux 2015 | Confidential | 24
Conclusion
 Reliability is not binary but a characteristic
that can be measured
 Based on theory of John Musa
 Practical 4 step approach
 Reliability is not reached by accident
 For a full description and worked out case
study, see next page…
© Sioux 2015 | Confidential | 25
Questions
© Sioux 2015 | Confidential | 26
Published February 2015:
www.amazon.com
ISBN: 978-1499226669
Rob de Bie
Bryan Bakker
René van den Eertwegh
Peter Wijnhoven
 Backup slides
© Sioux 2015 | Confidential | 27
Reliability Curves
 Bathtub curve
Hardware Reliability
 Sawtooth curve
Software Reliability
© Sioux 2015 | Confidential | 28
29© Sioux 2015 | Confidential |
www.sioux.eu
bryan.bakker@sioux.eu
+31 (0)40 26 77 100

Weitere ähnliche Inhalte

Was ist angesagt?

Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech SolutionsJhugueno
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch managementSolarwinds N-able
 
ITA Presentation 2010
ITA Presentation 2010ITA Presentation 2010
ITA Presentation 2010scottlberg
 
Magenic-White-Paper-Continuous-Inegration-for-QA-Teams
Magenic-White-Paper-Continuous-Inegration-for-QA-TeamsMagenic-White-Paper-Continuous-Inegration-for-QA-Teams
Magenic-White-Paper-Continuous-Inegration-for-QA-TeamsAaron Humerickhouse
 
Key Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps ReportKey Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps ReportPuppet
 
1, 2, 3 build - continuous integration for mobile apps
1, 2, 3   build - continuous integration for mobile apps1, 2, 3   build - continuous integration for mobile apps
1, 2, 3 build - continuous integration for mobile appsAlexander Pacha
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. ManageEngine, Zoho Corporation
 
Emergency Access Management
Emergency Access ManagementEmergency Access Management
Emergency Access ManagementXpandion
 
10 Warning Signs of Weak Requirements Management
10 Warning Signs of Weak Requirements Management10 Warning Signs of Weak Requirements Management
10 Warning Signs of Weak Requirements ManagementPerforce
 
Secured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsSecured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsYokogawa
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshareAmir Einav
 
Blancco Mobile Diagnostics
Blancco Mobile DiagnosticsBlancco Mobile Diagnostics
Blancco Mobile DiagnosticsJemma Elliott
 
Take your code and quality to the next level by Serena Software
Take your code and quality to the next level by Serena SoftwareTake your code and quality to the next level by Serena Software
Take your code and quality to the next level by Serena SoftwareSerena Software
 
Monitoring & Observability
Monitoring & ObservabilityMonitoring & Observability
Monitoring & ObservabilityLumban Sopian
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
 
Introduction to Software Failure Modes Effects Analysis
Introduction to Software Failure Modes Effects AnalysisIntroduction to Software Failure Modes Effects Analysis
Introduction to Software Failure Modes Effects AnalysisAnn Marie Neufelder
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 

Was ist angesagt? (20)

Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech Solutions
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch management
 
ITA Presentation 2010
ITA Presentation 2010ITA Presentation 2010
ITA Presentation 2010
 
Magenic-White-Paper-Continuous-Inegration-for-QA-Teams
Magenic-White-Paper-Continuous-Inegration-for-QA-TeamsMagenic-White-Paper-Continuous-Inegration-for-QA-Teams
Magenic-White-Paper-Continuous-Inegration-for-QA-Teams
 
Key Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps ReportKey Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps Report
 
1, 2, 3 build - continuous integration for mobile apps
1, 2, 3   build - continuous integration for mobile apps1, 2, 3   build - continuous integration for mobile apps
1, 2, 3 build - continuous integration for mobile apps
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
 
I safety ppt
I safety ppt I safety ppt
I safety ppt
 
Emergency Access Management
Emergency Access ManagementEmergency Access Management
Emergency Access Management
 
10 Warning Signs of Weak Requirements Management
10 Warning Signs of Weak Requirements Management10 Warning Signs of Weak Requirements Management
10 Warning Signs of Weak Requirements Management
 
Secured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsSecured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant Assets
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshare
 
Blancco Mobile Diagnostics
Blancco Mobile DiagnosticsBlancco Mobile Diagnostics
Blancco Mobile Diagnostics
 
Take your code and quality to the next level by Serena Software
Take your code and quality to the next level by Serena SoftwareTake your code and quality to the next level by Serena Software
Take your code and quality to the next level by Serena Software
 
Monitoring & Observability
Monitoring & ObservabilityMonitoring & Observability
Monitoring & Observability
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Introduction to Software Failure Modes Effects Analysis
Introduction to Software Failure Modes Effects AnalysisIntroduction to Software Failure Modes Effects Analysis
Introduction to Software Failure Modes Effects Analysis
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Building the Digital Bank
Building the Digital BankBuilding the Digital Bank
Building the Digital Bank
 
MidoNet roadmap
MidoNet roadmapMidoNet roadmap
MidoNet roadmap
 

Ähnlich wie Finally… reliable software!

Mdd test qa_test2014_bryan_bakker
Mdd test qa_test2014_bryan_bakkerMdd test qa_test2014_bryan_bakker
Mdd test qa_test2014_bryan_bakkerBryan Bakker
 
Enabling Mobility through Continuous Delivery
Enabling Mobility through Continuous DeliveryEnabling Mobility through Continuous Delivery
Enabling Mobility through Continuous DeliveryMichael Medin
 
Reliability Levels of Subsea Production Systems During Operations
Reliability Levels of Subsea Production Systems During OperationsReliability Levels of Subsea Production Systems During Operations
Reliability Levels of Subsea Production Systems During OperationsLloyd's Register Energy
 
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA ChennaiAbhay Bhargav
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept PresentationAbhay Bhargav
 
Implement an Enterprise Performance Test Process
Implement an Enterprise Performance Test ProcessImplement an Enterprise Performance Test Process
Implement an Enterprise Performance Test ProcessTechWell
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Kevin Fealey
 
Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development Rogue Wave Software
 
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...RapidValue
 
The quality assurance checklist for progressive testing
The quality assurance checklist for progressive testingThe quality assurance checklist for progressive testing
The quality assurance checklist for progressive testingMaitrikpaida
 
The Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive TestingThe Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive TestingCygnet Infotech
 
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan BakkerTEST Huddle
 
How to deploy AppInternals in azure
How to deploy AppInternals in azureHow to deploy AppInternals in azure
How to deploy AppInternals in azureIan Downard
 
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPT
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPTManaging Your ROI & TCO In Automation Testing | V&V Webinar PPT
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPTSadatulla Zishan
 
How to build confidence in your release cycle
How to build confidence in your release cycleHow to build confidence in your release cycle
How to build confidence in your release cycleDiUS
 
Software Testing - Online Guide
Software Testing - Online GuideSoftware Testing - Online Guide
Software Testing - Online Guidebigspire
 
Implementing Continuous Integration to Improve Software Quality
Implementing Continuous Integration to Improve Software QualityImplementing Continuous Integration to Improve Software Quality
Implementing Continuous Integration to Improve Software QualityRocket Software
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Kevin Fealey
 

Ähnlich wie Finally… reliable software! (20)

Mdd test qa_test2014_bryan_bakker
Mdd test qa_test2014_bryan_bakkerMdd test qa_test2014_bryan_bakker
Mdd test qa_test2014_bryan_bakker
 
Enabling Mobility through Continuous Delivery
Enabling Mobility through Continuous DeliveryEnabling Mobility through Continuous Delivery
Enabling Mobility through Continuous Delivery
 
Reliability Levels of Subsea Production Systems During Operations
Reliability Levels of Subsea Production Systems During OperationsReliability Levels of Subsea Production Systems During Operations
Reliability Levels of Subsea Production Systems During Operations
 
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennai
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentation
 
Implement an Enterprise Performance Test Process
Implement an Enterprise Performance Test ProcessImplement an Enterprise Performance Test Process
Implement an Enterprise Performance Test Process
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
 
Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development
 
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
 
The quality assurance checklist for progressive testing
The quality assurance checklist for progressive testingThe quality assurance checklist for progressive testing
The quality assurance checklist for progressive testing
 
The Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive TestingThe Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive Testing
 
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
 
How to deploy AppInternals in azure
How to deploy AppInternals in azureHow to deploy AppInternals in azure
How to deploy AppInternals in azure
 
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPT
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPTManaging Your ROI & TCO In Automation Testing | V&V Webinar PPT
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPT
 
How to build confidence in your release cycle
How to build confidence in your release cycleHow to build confidence in your release cycle
How to build confidence in your release cycle
 
Software Testing - Online Guide
Software Testing - Online GuideSoftware Testing - Online Guide
Software Testing - Online Guide
 
Implementing Continuous Integration to Improve Software Quality
Implementing Continuous Integration to Improve Software QualityImplementing Continuous Integration to Improve Software Quality
Implementing Continuous Integration to Improve Software Quality
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...
 

Mehr von nextbuild

Aws microservice keynote
Aws microservice keynoteAws microservice keynote
Aws microservice keynotenextbuild
 
How invariants help writing loops
How invariants help writing loopsHow invariants help writing loops
How invariants help writing loopsnextbuild
 
A first taste of integration with Apache Camel
A first taste of integration with Apache CamelA first taste of integration with Apache Camel
A first taste of integration with Apache Camelnextbuild
 
Effective code reviews
Effective code reviewsEffective code reviews
Effective code reviewsnextbuild
 
Microservices in the real world
Microservices in the real worldMicroservices in the real world
Microservices in the real worldnextbuild
 
Asp.net in a new world
Asp.net in a new worldAsp.net in a new world
Asp.net in a new worldnextbuild
 
Meteor - building an email client
Meteor - building an email clientMeteor - building an email client
Meteor - building an email clientnextbuild
 
Swimming upstream in the container revolution
Swimming upstream in the container revolutionSwimming upstream in the container revolution
Swimming upstream in the container revolutionnextbuild
 
Event sourcing your AngularJS applications
Event sourcing your AngularJS applicationsEvent sourcing your AngularJS applications
Event sourcing your AngularJS applicationsnextbuild
 
Make color schemes a no brainer with sass
Make color schemes a no brainer with sassMake color schemes a no brainer with sass
Make color schemes a no brainer with sassnextbuild
 
Cqrs from the trenches
Cqrs from the trenchesCqrs from the trenches
Cqrs from the trenchesnextbuild
 
Architecting for the cloud
Architecting for the cloudArchitecting for the cloud
Architecting for the cloudnextbuild
 
Cucumber spec - a tool takes your bdd to the next level
Cucumber spec - a tool takes your bdd to the next levelCucumber spec - a tool takes your bdd to the next level
Cucumber spec - a tool takes your bdd to the next levelnextbuild
 

Mehr von nextbuild (13)

Aws microservice keynote
Aws microservice keynoteAws microservice keynote
Aws microservice keynote
 
How invariants help writing loops
How invariants help writing loopsHow invariants help writing loops
How invariants help writing loops
 
A first taste of integration with Apache Camel
A first taste of integration with Apache CamelA first taste of integration with Apache Camel
A first taste of integration with Apache Camel
 
Effective code reviews
Effective code reviewsEffective code reviews
Effective code reviews
 
Microservices in the real world
Microservices in the real worldMicroservices in the real world
Microservices in the real world
 
Asp.net in a new world
Asp.net in a new worldAsp.net in a new world
Asp.net in a new world
 
Meteor - building an email client
Meteor - building an email clientMeteor - building an email client
Meteor - building an email client
 
Swimming upstream in the container revolution
Swimming upstream in the container revolutionSwimming upstream in the container revolution
Swimming upstream in the container revolution
 
Event sourcing your AngularJS applications
Event sourcing your AngularJS applicationsEvent sourcing your AngularJS applications
Event sourcing your AngularJS applications
 
Make color schemes a no brainer with sass
Make color schemes a no brainer with sassMake color schemes a no brainer with sass
Make color schemes a no brainer with sass
 
Cqrs from the trenches
Cqrs from the trenchesCqrs from the trenches
Cqrs from the trenches
 
Architecting for the cloud
Architecting for the cloudArchitecting for the cloud
Architecting for the cloud
 
Cucumber spec - a tool takes your bdd to the next level
Cucumber spec - a tool takes your bdd to the next levelCucumber spec - a tool takes your bdd to the next level
Cucumber spec - a tool takes your bdd to the next level
 

Kürzlich hochgeladen

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Finally… reliable software!

  • 1. Finally… Reliable Software! Bryan Bakker Eindhoven 2015 bryan.bakker@sioux.eu @Bryan_Bakker
  • 2. Contents  Intro  Reliability  Four step model  Different steps in detail  Conclusion © Sioux 2015 | Confidential | 2
  • 3. Thanks Thanks to:  Rob de Bie  René van den Eertwegh  Peter Wijnhoven © Sioux 2015 | Confidential | 3
  • 4. About Bryan Bakker  Test Expert  Certifications: ISTQB, TMap, Prince2  Member of ISTQB Expert Level on Test Automation  Tutor of several test related courses  Domains: medical systems, professional security systems, semi-industry, electron microscopy  Specialties: test automation, integration testing, design for testability, reliability testing © Sioux 2015 | Confidential | 4
  • 5. About Sioux HERENTALS NUENEN EINDHOVEN UTRECHT MOSCOW © Sioux 2015 | Confidential | 5 DANANG
  • 6.  Did you ever experience unreliable software? Reliability © Sioux 2015 | Confidential | 6
  • 7. Reliability  What is reliability? “Software Reliability is the probability of failure- free software operation in a specified environment for a specified period of time.” IEEE 729 In short:  Something can be functional correct  But is it reliable? © Sioux 2015 | Confidential | 7
  • 8. Reliability  What is reliability? “Software Reliability is the probability of failure- free software operation in a specified environment for a specified period of time.” IEEE 729 In short:  Something can be functional correct  But is it reliable? How reliable is it? © Sioux 2015 | Confidential | 8
  • 9. Four steps © Sioux 2015 | Confidential | 9 Example: Security and Surveillance System  Cameras  Recording  Event Handling
  • 10. Define user domain reliability targets:  Define customer profiles  Identify operation modes and critical functions  Determine reliability requirements per operation mode / critical function First step © Sioux 2015 | Confidential | 10
  • 11.  Define customer profiles  ATM security First step © Sioux 2015 | Confidential | 11
  • 12.  Define customer profiles  ATM security  Parking lot surveillance First step © Sioux 2015 | Confidential | 12
  • 13.  Define customer profiles  ATM security  Parking lot surveillance  Airport surveillance First step © Sioux 2015 | Confidential | 13
  • 14.  Identify operation modes and critical functions  Recording mode  Playback mode  Auto-start (critical)  Out-of-the-box  User triggered  Software reset First step © Sioux 2015 | Confidential | 14
  • 15.  Determine reliability requirements per operation mode / critical function  Segment between 0.5s and 2s missed  failure rate ≤1x per day  Playback command does not function as expected  failure rate ≤ 1x per hour of viewing  Not auto-started  failure rate ≤ 3 * 10-7 failures/restart First step © Sioux 2015 | Confidential | 15
  • 16.  Define operational profile for user functions  Decompose software reliability targets  Decompose operational profile with probabilities per component Second step © Sioux 2015 | Confidential | 16
  • 17.  How will the product be used by customers?  Focus development resources based on expected usage  Operational profile: a quantitative characterization of how a system will be used  Developed by John Musa  To be used for development and test activities  Also very useful for reliability Operational profile © Sioux 2015 | Confidential | 17
  • 18.  Critical functions can be missed in operational profiles.  Treat them separately! What about? © Sioux 2015 | Confidential | 18
  • 19.  Define operational profile for user functions Second step © Sioux 2015 | Confidential | 19
  • 20.  Decompose software reliability targets  Not auto-started  failure rate <= 3 * 10-7 failures/restart  Stream Handler contribution: 20%  “Target” = 0.6 * 10-7 failures / restart Second step © Sioux 2015 | Confidential | 20 Focus on Stream Handler component
  • 21.  Decompose operational profile with probabilities per component Second step © Sioux 2015 | Confidential | 21 Playback function Occurrence Probability % Stream Handler commands Play / Pause (toggle) 48 out of 100 48% Start / Stop Playback Fast forward 20 out of 100 20% Start Playback Fast reverse 20 out of 100 20% Start Playback Setup playback windows 10 out of 100 10% Stop / Start Playback Search and select event for playback 2 out of 100 2% Start Playback with time stamp = time of selected event
  • 22.  Define the engineering processes  Process steps to prevent reliability faults  Process steps to detect reliability faults  Design choices to minimize effects of faults Next steps © Sioux 2015 | Confidential | 22
  • 23.  Measure software reliability growth  Design and execute reliability tests  Based on the operational profiles  Randomly execute test set according to the operation profile  Extra focus on critical functions  Visualize reliability growths Next steps © Sioux 2015 | Confidential | 23
  • 24.  Reliability growth curve Next steps © Sioux 2015 | Confidential | 24
  • 25. Conclusion  Reliability is not binary but a characteristic that can be measured  Based on theory of John Musa  Practical 4 step approach  Reliability is not reached by accident  For a full description and worked out case study, see next page… © Sioux 2015 | Confidential | 25
  • 26. Questions © Sioux 2015 | Confidential | 26 Published February 2015: www.amazon.com ISBN: 978-1499226669 Rob de Bie Bryan Bakker René van den Eertwegh Peter Wijnhoven
  • 27.  Backup slides © Sioux 2015 | Confidential | 27
  • 28. Reliability Curves  Bathtub curve Hardware Reliability  Sawtooth curve Software Reliability © Sioux 2015 | Confidential | 28
  • 29. 29© Sioux 2015 | Confidential | www.sioux.eu bryan.bakker@sioux.eu +31 (0)40 26 77 100