SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Defect Management




                    1
Background: Maysinee
          Nakmanee                      By. Maysinee Nakmanee




Re-engineering Projects-Banking
Center of Software Engineering
Teaching/Guest Speaker for
public/private org.
Thompson-Reuters/Global
Development
– Global configuration management tool
– Global defect tracking tool
(current) DSTi- IFDS Group                       2

– International Financial Development
What is defect?
                                  By. Maysinee Nakmanee




Something wrong in the system
Can we live in the “defect-free” world?
What people can do to prevent the
defect?




                                           3
Defect/Bug Types
                                             By. Maysinee Nakmanee


Mild - misspell output, lack of white space
Moderate - output may be misleading or redundant
Annoying - users need tricks to get system to work
Disturbing - refuses to handle legitimate transaction
Serious - looses track of transaction and its
occurrence
Very serious - bug causes system to incorrect
transaction
Extreme - problem limited to a few user or a few
transaction type, frequent, and arbitrary
Intolerable -long term unrecoverable corruption of
database, system shutdown may need to occur
Infectious - corrupts other systems, system that 4
causes loss of life
Defect Management Process
                                          By. Maysinee Nakmanee



Refer to as “Incident Management Tools”

Prevent Defect
Find the defect as quickly as
possible
Should be
 – Impact analysis
 – Root-cause analysis
 – Improve the process


                                                   5
Defect Reporting
                                      By. Maysinee Nakmanee




Defects are recorded for four major
purpose
– Ensure defect is corrected
– Report status of the application
– Gather statistics used to develop defect
  expectation in future application
– To improve the software development
  process
                                               6
Defect Severity vs. Priority
                                       By. Maysinee Nakmanee



Severity: Defect may be defined as one
that causes data corruption or system crash,
security violation.




Priority: The order in which defects should
be fixed. It is more subjective as it may be
based on input from users regarding which
defects are most important, resources
available, risks.                               7
A sample defect tracking
                        process                              By. Maysinee Nakmanee


I. Run Test


     II. Log Defects


              III. Investigate
                   Defects


                             IV. Defect Resolution Process
                             1.   Priority the correction
                             2.   Schedule the correction
                             3.   Correct the defect
                             4.   Report the resolution
                                                               V. Report
                                                             the resolution
                                                                      8
By. Maysinee Nakmanee




         9
By. Maysinee Nakmanee




“Traceability”




                         10
Traceability of Requirement to
            Testing    By. Maysinee Nakmanee




Traceable from
–   Requirements
–   Planning
–   Development
–   Testing




                               11
Testing
               By. Maysinee Nakmanee




               Testing
             Unit Test
         System Test
     Regression Test
    Stabilization Test
User Acceptance Test
                       12
By. Maysinee Nakmanee




        13
Defect Information
                     By. Maysinee Nakmanee




            What is the
            defects
            Who found
            Who will fix
            In which
            area


                             14
Defect Type           By. Maysinee Nakmanee


        • When testers
          found the defects,
          we need to
          recheck first
          whether it is code
          issue or code
          related or not.
        • Sometimes, it may
          be defect from
          environment from
          data that has
          been conversed
                            15
          but not the code
Root cause of defects                     By. Maysinee Nakmanee




• The most important thing in defect management is to
  be able to identify the root cause of defect in order to
  prevent the future problem.

                                                         16
Priority of defects   By. Maysinee Nakmanee




                              17
Impacted Area
                  By. Maysinee Nakmanee




         Impact: Fix one
         part may affect to
         other parts. This
         may cause
         “Defective fix”
         defect.
         Review of
         impacted area is
         the most
         important before
                        18
         any resolution
Fix Defects
                                  By. Maysinee Nakmanee




Developer needs to provide
–   Resolution
–   When to finish the fix
–   Impacted area
–   Root cause of the defect
–   Unit test result of the fix
Tester needs to
– Re-assure the solution
– Re-test and Close the defect
                                          19
Fix Defects
                                   By. Maysinee Nakmanee




Would that be possible that some
defects have never been fixed?
What will affect to the system?
Why we do that?




                                           20
Defect Metrics
                 By. Maysinee Nakmanee




                         21
Defects Metrics
                                By. Maysinee Nakmanee




Phase Injected
Phase found
How many priority defects
How quick we can resolve the defects
Root cause of the defects
How long a defect has been openned

                                        22
Defect Management
                                    By. Maysinee Nakmanee




Collaboration between all parties
–   Developers
–   Testes
–   Business Analyst
–   System Analyst
Sometimes, Fix is a nice to have but
may not be a need to do

                                            23
Defects as requirements
                                  By. Maysinee Nakmanee




Collection of defects from previous
release/version can be come
requirements for next release.
– Production issue defects
– Minor defects




                                          24
Summary
                                      By. Maysinee Nakmanee




Defect management is the most important
process that all stakeholders need to aware
of.

Considering defect information to support
defect management.




                                              25

Weitere ähnliche Inhalte

Was ist angesagt?

software project management Software inspection
software project management Software inspectionsoftware project management Software inspection
software project management Software inspectionREHMAT ULLAH
 
Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Techpartnerz
 
Defect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsDefect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsMani Nutulapati
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect ManagementAjay K
 
From Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionFrom Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionSune Gynthersen
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of DefectsDavid Gevorgyan
 
Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!TechWell
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testingToshi Patel
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!SQALab
 
Defect prevention techniques
Defect prevention techniquesDefect prevention techniques
Defect prevention techniquesZarko Acimovic
 
Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Neil Thompson
 
Principles of Software testing
Principles of Software testingPrinciples of Software testing
Principles of Software testingMd Mamunur Rashid
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software TestersTechWell
 
Risk-based Testing
Risk-based TestingRisk-based Testing
Risk-based TestingJohan Hoberg
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods deep sharma
 
Risks of Risk-Based Testing
Risks of Risk-Based TestingRisks of Risk-Based Testing
Risks of Risk-Based Testingrrice2000
 

Was ist angesagt? (20)

software project management Software inspection
software project management Software inspectionsoftware project management Software inspection
software project management Software inspection
 
Defect Prevention
Defect PreventionDefect Prevention
Defect Prevention
 
Defect prevention
Defect preventionDefect prevention
Defect prevention
 
Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3
 
Defect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsDefect Analytics & Statistical Trends
Defect Analytics & Statistical Trends
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect Management
 
From Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionFrom Defect Reporting To Defect Prevention
From Defect Reporting To Defect Prevention
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of Defects
 
Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testing
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!
 
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
 
Defect prevention techniques
Defect prevention techniquesDefect prevention techniques
Defect prevention techniques
 
Bug first Zero Defect
Bug first   Zero DefectBug first   Zero Defect
Bug first Zero Defect
 
Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)
 
Principles of Software testing
Principles of Software testingPrinciples of Software testing
Principles of Software testing
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software Testers
 
Risk-based Testing
Risk-based TestingRisk-based Testing
Risk-based Testing
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods
 
Risks of Risk-Based Testing
Risks of Risk-Based TestingRisks of Risk-Based Testing
Risks of Risk-Based Testing
 

Ähnlich wie Defect Management on BugDay Bangkok 2009

Classic Testing Mistakes 0226
Classic Testing Mistakes 0226Classic Testing Mistakes 0226
Classic Testing Mistakes 0226MBA_Community
 
Tool Box Talk - Human Induced Failures 2
Tool Box Talk  - Human Induced Failures  2Tool Box Talk  - Human Induced Failures  2
Tool Box Talk - Human Induced Failures 2Ricky Smith CMRP, CMRT
 
Root cause analysis master plan
Root cause analysis master planRoot cause analysis master plan
Root cause analysis master planGlen Alleman
 
Dan Cornell - The Real Cost of Software Remediation
Dan Cornell  - The Real Cost of Software RemediationDan Cornell  - The Real Cost of Software Remediation
Dan Cornell - The Real Cost of Software RemediationSource Conference
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software RemediationDenim Group
 
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…Dario Spinola
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management Argyle Executive Forum
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptxsuresh667793
 
Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...vcuniversity
 
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudApica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudRightScale
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGrant Swanson
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment TechniquesDenim Group
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingCenzic
 
Reducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsReducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsWilde Analysis Ltd.
 
Performance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudPerformance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudRightScale
 
Yale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full SlidesYale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full Slidesssusercc0cac
 
Maintenance101_for_Linkedin
Maintenance101_for_LinkedinMaintenance101_for_Linkedin
Maintenance101_for_LinkedinDavid Trewartha
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedThomas Zimmermann
 

Ähnlich wie Defect Management on BugDay Bangkok 2009 (20)

Classic Testing Mistakes 0226
Classic Testing Mistakes 0226Classic Testing Mistakes 0226
Classic Testing Mistakes 0226
 
Tool Box Talk - Human Induced Failures 2
Tool Box Talk  - Human Induced Failures  2Tool Box Talk  - Human Induced Failures  2
Tool Box Talk - Human Induced Failures 2
 
Root cause analysis master plan
Root cause analysis master planRoot cause analysis master plan
Root cause analysis master plan
 
Dan Cornell - The Real Cost of Software Remediation
Dan Cornell  - The Real Cost of Software RemediationDan Cornell  - The Real Cost of Software Remediation
Dan Cornell - The Real Cost of Software Remediation
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
 
The key to improving your availability is fracas
The key to improving your availability is fracasThe key to improving your availability is fracas
The key to improving your availability is fracas
 
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptx
 
Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...
 
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudApica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance Monitoring
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security Testing
 
Presentation2
Presentation2Presentation2
Presentation2
 
Reducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsReducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering Methods
 
Performance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudPerformance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the Cloud
 
Yale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full SlidesYale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full Slides
 
Maintenance101_for_Linkedin
Maintenance101_for_LinkedinMaintenance101_for_Linkedin
Maintenance101_for_Linkedin
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
 

Mehr von Prathan Dansakulcharoenkit

QA Talk in Chiang Mai Community of Practice Meet Up 1/2017
QA Talk in Chiang Mai Community of Practice Meet Up 1/2017QA Talk in Chiang Mai Community of Practice Meet Up 1/2017
QA Talk in Chiang Mai Community of Practice Meet Up 1/2017Prathan Dansakulcharoenkit
 
IMC Monthly Talk: 10 ข้อที่ควรจะต้องทำในการเริ่มต้นนำ Agile for Software Deve...
IMC Monthly Talk: 10 ข้อที่ควรจะต้องทำในการเริ่มต้นนำ Agile for Software Deve...IMC Monthly Talk: 10 ข้อที่ควรจะต้องทำในการเริ่มต้นนำ Agile for Software Deve...
IMC Monthly Talk: 10 ข้อที่ควรจะต้องทำในการเริ่มต้นนำ Agile for Software Deve...Prathan Dansakulcharoenkit
 
อไจล์ ๑๐๑ รุ่น ๓.๐
อไจล์ ๑๐๑ รุ่น ๓.๐อไจล์ ๑๐๑ รุ่น ๓.๐
อไจล์ ๑๐๑ รุ่น ๓.๐Prathan Dansakulcharoenkit
 
Web Application Security Testing - Aware in BugDay Bangkok 2012
Web Application Security Testing - Aware in BugDay Bangkok 2012Web Application Security Testing - Aware in BugDay Bangkok 2012
Web Application Security Testing - Aware in BugDay Bangkok 2012Prathan Dansakulcharoenkit
 
The audacity of quality requirement-non functional testing- Aware in BugDay B...
The audacity of quality requirement-non functional testing- Aware in BugDay B...The audacity of quality requirement-non functional testing- Aware in BugDay B...
The audacity of quality requirement-non functional testing- Aware in BugDay B...Prathan Dansakulcharoenkit
 
How to live with agile - Aware in BugDay Bangkok 2012
How to live with agile - Aware in BugDay Bangkok 2012How to live with agile - Aware in BugDay Bangkok 2012
How to live with agile - Aware in BugDay Bangkok 2012Prathan Dansakulcharoenkit
 
Achieving Zero Defect with Agile Methods BugDay Bangkok 2012 โดย Varokas Pan...
Achieving Zero Defect with Agile Methods BugDay Bangkok 2012  โดย Varokas Pan...Achieving Zero Defect with Agile Methods BugDay Bangkok 2012  โดย Varokas Pan...
Achieving Zero Defect with Agile Methods BugDay Bangkok 2012 โดย Varokas Pan...Prathan Dansakulcharoenkit
 
Hyper Productivity BugDay Bangkok 2012 - โดย Chokchai Phatharamalai
Hyper Productivity BugDay Bangkok 2012 - โดย Chokchai Phatharamalai Hyper Productivity BugDay Bangkok 2012 - โดย Chokchai Phatharamalai
Hyper Productivity BugDay Bangkok 2012 - โดย Chokchai Phatharamalai Prathan Dansakulcharoenkit
 
ออกแบบ Test Cases เพื่อทำ Non-Functional Test โดย คุณณรงค์ จันทร์สร้อย
ออกแบบ Test Cases เพื่อทำ Non-Functional Test โดย คุณณรงค์ จันทร์สร้อยออกแบบ Test Cases เพื่อทำ Non-Functional Test โดย คุณณรงค์ จันทร์สร้อย
ออกแบบ Test Cases เพื่อทำ Non-Functional Test โดย คุณณรงค์ จันทร์สร้อยPrathan Dansakulcharoenkit
 
Writing Effective Bug Report - BugDay Bangkok 2012
Writing Effective Bug Report - BugDay Bangkok 2012Writing Effective Bug Report - BugDay Bangkok 2012
Writing Effective Bug Report - BugDay Bangkok 2012Prathan Dansakulcharoenkit
 
Test Case and User Story - BugDay Bangkok 2012
Test Case and User Story - BugDay Bangkok 2012Test Case and User Story - BugDay Bangkok 2012
Test Case and User Story - BugDay Bangkok 2012Prathan Dansakulcharoenkit
 

Mehr von Prathan Dansakulcharoenkit (20)

QA Talk in Chiang Mai Community of Practice Meet Up 1/2017
QA Talk in Chiang Mai Community of Practice Meet Up 1/2017QA Talk in Chiang Mai Community of Practice Meet Up 1/2017
QA Talk in Chiang Mai Community of Practice Meet Up 1/2017
 
IMC Monthly Talk: 10 ข้อที่ควรจะต้องทำในการเริ่มต้นนำ Agile for Software Deve...
IMC Monthly Talk: 10 ข้อที่ควรจะต้องทำในการเริ่มต้นนำ Agile for Software Deve...IMC Monthly Talk: 10 ข้อที่ควรจะต้องทำในการเริ่มต้นนำ Agile for Software Deve...
IMC Monthly Talk: 10 ข้อที่ควรจะต้องทำในการเริ่มต้นนำ Agile for Software Deve...
 
PROJECT MANAGEMENT TRAINING 09-22-2011
PROJECT MANAGEMENT TRAINING 09-22-2011PROJECT MANAGEMENT TRAINING 09-22-2011
PROJECT MANAGEMENT TRAINING 09-22-2011
 
tpse-sprint3r-software-testing-you-know-maybe
tpse-sprint3r-software-testing-you-know-maybetpse-sprint3r-software-testing-you-know-maybe
tpse-sprint3r-software-testing-you-know-maybe
 
SPRINT3R-SWPSDLC2556-CLOSING
SPRINT3R-SWPSDLC2556-CLOSINGSPRINT3R-SWPSDLC2556-CLOSING
SPRINT3R-SWPSDLC2556-CLOSING
 
Introduction to Scrum version 3.1
Introduction to Scrum version 3.1Introduction to Scrum version 3.1
Introduction to Scrum version 3.1
 
SPRINT3R-MY-CITY
SPRINT3R-MY-CITYSPRINT3R-MY-CITY
SPRINT3R-MY-CITY
 
อไจล์ ๑๐๑ รุ่น ๓.๐
อไจล์ ๑๐๑ รุ่น ๓.๐อไจล์ ๑๐๑ รุ่น ๓.๐
อไจล์ ๑๐๑ รุ่น ๓.๐
 
Geek Academy Introduction to Agile
Geek Academy Introduction to AgileGeek Academy Introduction to Agile
Geek Academy Introduction to Agile
 
Sprint3 r agile101-introduction-18052556
Sprint3 r agile101-introduction-18052556Sprint3 r agile101-introduction-18052556
Sprint3 r agile101-introduction-18052556
 
hello-my-name-is-software-testing-v2-pdf
hello-my-name-is-software-testing-v2-pdfhello-my-name-is-software-testing-v2-pdf
hello-my-name-is-software-testing-v2-pdf
 
Opening Session of BugDay Bangkok 2012
Opening Session of BugDay Bangkok 2012Opening Session of BugDay Bangkok 2012
Opening Session of BugDay Bangkok 2012
 
Web Application Security Testing - Aware in BugDay Bangkok 2012
Web Application Security Testing - Aware in BugDay Bangkok 2012Web Application Security Testing - Aware in BugDay Bangkok 2012
Web Application Security Testing - Aware in BugDay Bangkok 2012
 
The audacity of quality requirement-non functional testing- Aware in BugDay B...
The audacity of quality requirement-non functional testing- Aware in BugDay B...The audacity of quality requirement-non functional testing- Aware in BugDay B...
The audacity of quality requirement-non functional testing- Aware in BugDay B...
 
How to live with agile - Aware in BugDay Bangkok 2012
How to live with agile - Aware in BugDay Bangkok 2012How to live with agile - Aware in BugDay Bangkok 2012
How to live with agile - Aware in BugDay Bangkok 2012
 
Achieving Zero Defect with Agile Methods BugDay Bangkok 2012 โดย Varokas Pan...
Achieving Zero Defect with Agile Methods BugDay Bangkok 2012  โดย Varokas Pan...Achieving Zero Defect with Agile Methods BugDay Bangkok 2012  โดย Varokas Pan...
Achieving Zero Defect with Agile Methods BugDay Bangkok 2012 โดย Varokas Pan...
 
Hyper Productivity BugDay Bangkok 2012 - โดย Chokchai Phatharamalai
Hyper Productivity BugDay Bangkok 2012 - โดย Chokchai Phatharamalai Hyper Productivity BugDay Bangkok 2012 - โดย Chokchai Phatharamalai
Hyper Productivity BugDay Bangkok 2012 - โดย Chokchai Phatharamalai
 
ออกแบบ Test Cases เพื่อทำ Non-Functional Test โดย คุณณรงค์ จันทร์สร้อย
ออกแบบ Test Cases เพื่อทำ Non-Functional Test โดย คุณณรงค์ จันทร์สร้อยออกแบบ Test Cases เพื่อทำ Non-Functional Test โดย คุณณรงค์ จันทร์สร้อย
ออกแบบ Test Cases เพื่อทำ Non-Functional Test โดย คุณณรงค์ จันทร์สร้อย
 
Writing Effective Bug Report - BugDay Bangkok 2012
Writing Effective Bug Report - BugDay Bangkok 2012Writing Effective Bug Report - BugDay Bangkok 2012
Writing Effective Bug Report - BugDay Bangkok 2012
 
Test Case and User Story - BugDay Bangkok 2012
Test Case and User Story - BugDay Bangkok 2012Test Case and User Story - BugDay Bangkok 2012
Test Case and User Story - BugDay Bangkok 2012
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Defect Management on BugDay Bangkok 2009

  • 2. Background: Maysinee Nakmanee By. Maysinee Nakmanee Re-engineering Projects-Banking Center of Software Engineering Teaching/Guest Speaker for public/private org. Thompson-Reuters/Global Development – Global configuration management tool – Global defect tracking tool (current) DSTi- IFDS Group 2 – International Financial Development
  • 3. What is defect? By. Maysinee Nakmanee Something wrong in the system Can we live in the “defect-free” world? What people can do to prevent the defect? 3
  • 4. Defect/Bug Types By. Maysinee Nakmanee Mild - misspell output, lack of white space Moderate - output may be misleading or redundant Annoying - users need tricks to get system to work Disturbing - refuses to handle legitimate transaction Serious - looses track of transaction and its occurrence Very serious - bug causes system to incorrect transaction Extreme - problem limited to a few user or a few transaction type, frequent, and arbitrary Intolerable -long term unrecoverable corruption of database, system shutdown may need to occur Infectious - corrupts other systems, system that 4 causes loss of life
  • 5. Defect Management Process By. Maysinee Nakmanee Refer to as “Incident Management Tools” Prevent Defect Find the defect as quickly as possible Should be – Impact analysis – Root-cause analysis – Improve the process 5
  • 6. Defect Reporting By. Maysinee Nakmanee Defects are recorded for four major purpose – Ensure defect is corrected – Report status of the application – Gather statistics used to develop defect expectation in future application – To improve the software development process 6
  • 7. Defect Severity vs. Priority By. Maysinee Nakmanee Severity: Defect may be defined as one that causes data corruption or system crash, security violation. Priority: The order in which defects should be fixed. It is more subjective as it may be based on input from users regarding which defects are most important, resources available, risks. 7
  • 8. A sample defect tracking process By. Maysinee Nakmanee I. Run Test II. Log Defects III. Investigate Defects IV. Defect Resolution Process 1. Priority the correction 2. Schedule the correction 3. Correct the defect 4. Report the resolution V. Report the resolution 8
  • 11. Traceability of Requirement to Testing By. Maysinee Nakmanee Traceable from – Requirements – Planning – Development – Testing 11
  • 12. Testing By. Maysinee Nakmanee Testing Unit Test System Test Regression Test Stabilization Test User Acceptance Test 12
  • 14. Defect Information By. Maysinee Nakmanee What is the defects Who found Who will fix In which area 14
  • 15. Defect Type By. Maysinee Nakmanee • When testers found the defects, we need to recheck first whether it is code issue or code related or not. • Sometimes, it may be defect from environment from data that has been conversed 15 but not the code
  • 16. Root cause of defects By. Maysinee Nakmanee • The most important thing in defect management is to be able to identify the root cause of defect in order to prevent the future problem. 16
  • 17. Priority of defects By. Maysinee Nakmanee 17
  • 18. Impacted Area By. Maysinee Nakmanee Impact: Fix one part may affect to other parts. This may cause “Defective fix” defect. Review of impacted area is the most important before 18 any resolution
  • 19. Fix Defects By. Maysinee Nakmanee Developer needs to provide – Resolution – When to finish the fix – Impacted area – Root cause of the defect – Unit test result of the fix Tester needs to – Re-assure the solution – Re-test and Close the defect 19
  • 20. Fix Defects By. Maysinee Nakmanee Would that be possible that some defects have never been fixed? What will affect to the system? Why we do that? 20
  • 21. Defect Metrics By. Maysinee Nakmanee 21
  • 22. Defects Metrics By. Maysinee Nakmanee Phase Injected Phase found How many priority defects How quick we can resolve the defects Root cause of the defects How long a defect has been openned 22
  • 23. Defect Management By. Maysinee Nakmanee Collaboration between all parties – Developers – Testes – Business Analyst – System Analyst Sometimes, Fix is a nice to have but may not be a need to do 23
  • 24. Defects as requirements By. Maysinee Nakmanee Collection of defects from previous release/version can be come requirements for next release. – Production issue defects – Minor defects 24
  • 25. Summary By. Maysinee Nakmanee Defect management is the most important process that all stakeholders need to aware of. Considering defect information to support defect management. 25