SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019
The automation
‘breakup’
Saying goodbye to full stack tests with task analysis
Mark Winteringham
@2bittester
Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019
How do we know if a
check is valuable?
Automation in Testing - © Mark Winteringham - 2019
User can log into an
application
Automation in Testing - © Mark Winteringham - 2019
Targeted?
Automation in Testing - © Mark Winteringham - 2019
Reliable?
Automation in Testing - © Mark Winteringham - 2019
Informative?
Automation in Testing - © Mark Winteringham - 2019
Maintainable?
Automation in Testing - © Mark Winteringham - 2019
Speedy?
Automation in Testing - © Mark Winteringham - 2019
Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019
How do we identify and
implement valuable
checks?
Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019
TASK ANALYSIS!
Automation in Testing - © Mark Winteringham - 2019
www.thunderboltkids.co.za
Automation in Testing - © Mark Winteringham - 2019
UI
JS
API
SVC
Click login
link
Build
login page
Interact
with Login
Send credentials
to Auth API
Parse
credential
s
Check credentials /
Create token
Send token
Flag as
logged in
Render
room comp.
View
rooms
Successful
login flow
Initial state:
• Single page app code loaded into browser
• Current state is not logged in Triggers
Seam /
LayerAction
Key:
JS/HTML
HTTP
JAVA
USER
Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019
Risk analysis
Automation in Testing - © Mark Winteringham - 2019
Parse
credential
s
UI
JS
API
SVC
Click login
link
Build
login page
Interact
with Login
Send credentials
to Auth API
Check credentials /
Create token
Flag as
logged in
View
rooms
Successful
login flow Triggers
Seam /
LayerAction
Key:
JS/HTML
HTTP
JAVA
Send token
USER
🔎
Initial state:
• Single page app code loaded into browser
• Current state is not logged in
Check form is
rendered correctly
Visual check
🤖
Render
room comp.
Automation in Testing - © Mark Winteringham - 2019
UI
JS
API
SVC
Click login
link
Build
login page
Interact
with Login
Send credentials
to Auth API
Check credentials /
Create token
Flag as
logged in
View
rooms
Successful
login flow Triggers
Seam /
LayerAction
Key:
JS/HTML
HTTP
JAVA
Parse
credential
s
Send token
🤖 🔎
Initial state:
• Single page app code loaded into browser
• Current state is not logged in
Check API handles
request and response
correctly
API check
USER
Render
room comp.
Automation in Testing - © Mark Winteringham - 2019
Parse
credential
s
UI
JS
API
SVC
Click login
link
Build
login page
Interact
with Login
Send credentials
to Auth API
Check credentials /
Create token
Flag as
logged in
View
rooms
Successful
login flow Triggers
Seam /
LayerAction
Key:
JS/HTML
HTTP
JAVA
Send token
Render
room comp.
🤖 🔎
Initial state:
• Single page app code loaded into browser
• Current state is not logged in
Check token is
created correctly
Unit check
USER
Automation in Testing - © Mark Winteringham - 2019
Parse
credential
s
UI
JS
API
SVC
Click login
link
Build
login page
Interact
with Login
Send credentials
to Auth API
Check credentials /
Create token
Flag as
logged in
View
rooms
Successful
login flow Triggers
Seam /
LayerAction
Key:
JS/HTML
HTTP
JAVA
Send token
🤖 🔎
Initial state:
• Single page app code loaded into browser
• Current state is not logged in
Check login page
HTML is correct
Unit check
USER
Render
room comp.
Automation in Testing - © Mark Winteringham - 2019
Visual checks
Check form is
rendered
correctly
JavaScript unit
checks
Backend unit checks Backend API checks
Full stack smoke
check
Check API
handles request
and response
correctly
Check login page
HTML is correct
Check token is
created correctly
Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019
In Summary
Automation in Testing - © Mark Winteringham - 2019
Are your checks TRIMS?
Apply task analysis
Use task analysis to identify targeted checks
Connect checks in a ‘chain of trust’
Automation in Testing - © Mark Winteringham - 2019
Mark Winteringham
@2bittester
www.mwtestconsultancy.co.uk
www.automationintesting.com
github.com/mwinteringham/restful-booker-platform

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Exploratory Testing
Exploratory TestingExploratory Testing
Exploratory Testing
 
The Test Pyramid
The Test PyramidThe Test Pyramid
The Test Pyramid
 
Talks@Coursera - A/B Testing @ Internet Scale
Talks@Coursera - A/B Testing @ Internet ScaleTalks@Coursera - A/B Testing @ Internet Scale
Talks@Coursera - A/B Testing @ Internet Scale
 
Api Testing
Api TestingApi Testing
Api Testing
 
A Taste of Exploratory Testing
A Taste of Exploratory TestingA Taste of Exploratory Testing
A Taste of Exploratory Testing
 
An Introduction To Automated API Testing
An Introduction To Automated API TestingAn Introduction To Automated API Testing
An Introduction To Automated API Testing
 
Appium Dockerization: from Scratch to Advanced Implementation - HUSTEF 2019
Appium Dockerization: from Scratch to Advanced Implementation - HUSTEF 2019Appium Dockerization: from Scratch to Advanced Implementation - HUSTEF 2019
Appium Dockerization: from Scratch to Advanced Implementation - HUSTEF 2019
 
API Testing
API TestingAPI Testing
API Testing
 
RESTful API Testing using Postman, Newman, and Jenkins
RESTful API Testing using Postman, Newman, and JenkinsRESTful API Testing using Postman, Newman, and Jenkins
RESTful API Testing using Postman, Newman, and Jenkins
 
Automation testing
Automation testingAutomation testing
Automation testing
 
4 Major Advantages of API Testing
4 Major Advantages of API Testing4 Major Advantages of API Testing
4 Major Advantages of API Testing
 
A/B testing at Spotify
A/B testing at SpotifyA/B testing at Spotify
A/B testing at Spotify
 
Uber PM Talks: How To Crack A PM Interview
Uber PM Talks: How To Crack A PM InterviewUber PM Talks: How To Crack A PM Interview
Uber PM Talks: How To Crack A PM Interview
 
Introduction to Selenium Automation
Introduction to Selenium AutomationIntroduction to Selenium Automation
Introduction to Selenium Automation
 
Workshop Agile Testing Mindset
Workshop Agile Testing MindsetWorkshop Agile Testing Mindset
Workshop Agile Testing Mindset
 
API TESTING
API TESTINGAPI TESTING
API TESTING
 
Client-Side Performance Testing
Client-Side Performance TestingClient-Side Performance Testing
Client-Side Performance Testing
 
How to take organizations to higher testing maturity suresh bose anagha mahaj...
How to take organizations to higher testing maturity suresh bose anagha mahaj...How to take organizations to higher testing maturity suresh bose anagha mahaj...
How to take organizations to higher testing maturity suresh bose anagha mahaj...
 
Peeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API SecurityPeeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API Security
 
Advanced API Debugging
Advanced API DebuggingAdvanced API Debugging
Advanced API Debugging
 

Ähnlich wie The automation break up: saying goodbye to full stack tests with task analysis

Ähnlich wie The automation break up: saying goodbye to full stack tests with task analysis (20)

[WSO2 Integration Summit Nairobi 2019] Identity and Access Management in an A...
[WSO2 Integration Summit Nairobi 2019] Identity and Access Management in an A...[WSO2 Integration Summit Nairobi 2019] Identity and Access Management in an A...
[WSO2 Integration Summit Nairobi 2019] Identity and Access Management in an A...
 
[WSO2 Integration Summit Johannesburg 2019] Identity and Access Management in...
[WSO2 Integration Summit Johannesburg 2019] Identity and Access Management in...[WSO2 Integration Summit Johannesburg 2019] Identity and Access Management in...
[WSO2 Integration Summit Johannesburg 2019] Identity and Access Management in...
 
[WSO2 Integration Summit Madrid 2019] Identity and Access Management in an AP...
[WSO2 Integration Summit Madrid 2019] Identity and Access Management in an AP...[WSO2 Integration Summit Madrid 2019] Identity and Access Management in an AP...
[WSO2 Integration Summit Madrid 2019] Identity and Access Management in an AP...
 
[WSO2 Integration Summit Stuttgart 2019] Identity and Access Management in an...
[WSO2 Integration Summit Stuttgart 2019] Identity and Access Management in an...[WSO2 Integration Summit Stuttgart 2019] Identity and Access Management in an...
[WSO2 Integration Summit Stuttgart 2019] Identity and Access Management in an...
 
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - IAM in an API Driven ...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - IAM in an API Driven ...WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - IAM in an API Driven ...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - IAM in an API Driven ...
 
[WSO2 API Day Chicago 2019] Sustainable Competitive Advantage
[WSO2 API Day Chicago 2019] Sustainable Competitive Advantage [WSO2 API Day Chicago 2019] Sustainable Competitive Advantage
[WSO2 API Day Chicago 2019] Sustainable Competitive Advantage
 
[WSO2 Summit Sydney 2019] Identity and Access Management in an API-driven World
[WSO2 Summit Sydney 2019] Identity and Access Management in an API-driven World[WSO2 Summit Sydney 2019] Identity and Access Management in an API-driven World
[WSO2 Summit Sydney 2019] Identity and Access Management in an API-driven World
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
How to avoid Java and .Net Application Performance Issues using Business Tran...
How to avoid Java and .Net Application Performance Issues using Business Tran...How to avoid Java and .Net Application Performance Issues using Business Tran...
How to avoid Java and .Net Application Performance Issues using Business Tran...
 
Continuous Testing vs Test Automation Share on Facebook Share on LinkedIn Sha...
Continuous Testing vs Test Automation Share on Facebook Share on LinkedIn Sha...Continuous Testing vs Test Automation Share on Facebook Share on LinkedIn Sha...
Continuous Testing vs Test Automation Share on Facebook Share on LinkedIn Sha...
 
Creating a Machine Learning Factory
Creating a Machine Learning FactoryCreating a Machine Learning Factory
Creating a Machine Learning Factory
 
IRJET- Agriculture Business to Business Website
IRJET- Agriculture Business to Business WebsiteIRJET- Agriculture Business to Business Website
IRJET- Agriculture Business to Business Website
 
A perspective on web testing
A perspective on web testingA perspective on web testing
A perspective on web testing
 
A perspective on web testing
A perspective on web testingA perspective on web testing
A perspective on web testing
 
Eradicate Flaky Tests
Eradicate Flaky TestsEradicate Flaky Tests
Eradicate Flaky Tests
 
Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...
Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...
Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven Differentiation
 
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009AlertSite Slideshow for the Booth at Web 2.0 Expo 2009
AlertSite Slideshow for the Booth at Web 2.0 Expo 2009
 
AlertSite Slideshow at Web 2.0 Expo 2009
AlertSite Slideshow at Web 2.0 Expo 2009AlertSite Slideshow at Web 2.0 Expo 2009
AlertSite Slideshow at Web 2.0 Expo 2009
 
Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...
Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...
Cloudlets and DevOps - A Dangerously Powerful Combination to Extend Capabilit...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

The automation break up: saying goodbye to full stack tests with task analysis

  • 1. Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019 The automation ‘breakup’ Saying goodbye to full stack tests with task analysis Mark Winteringham @2bittester
  • 2. Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019 How do we know if a check is valuable?
  • 3. Automation in Testing - © Mark Winteringham - 2019 User can log into an application
  • 4. Automation in Testing - © Mark Winteringham - 2019 Targeted?
  • 5. Automation in Testing - © Mark Winteringham - 2019 Reliable?
  • 6. Automation in Testing - © Mark Winteringham - 2019 Informative?
  • 7. Automation in Testing - © Mark Winteringham - 2019 Maintainable?
  • 8. Automation in Testing - © Mark Winteringham - 2019 Speedy?
  • 9. Automation in Testing - © Mark Winteringham - 2019
  • 10. Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019 How do we identify and implement valuable checks?
  • 11. Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019 TASK ANALYSIS!
  • 12. Automation in Testing - © Mark Winteringham - 2019 www.thunderboltkids.co.za
  • 13. Automation in Testing - © Mark Winteringham - 2019 UI JS API SVC Click login link Build login page Interact with Login Send credentials to Auth API Parse credential s Check credentials / Create token Send token Flag as logged in Render room comp. View rooms Successful login flow Initial state: • Single page app code loaded into browser • Current state is not logged in Triggers Seam / LayerAction Key: JS/HTML HTTP JAVA USER
  • 14. Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019 Risk analysis
  • 15. Automation in Testing - © Mark Winteringham - 2019 Parse credential s UI JS API SVC Click login link Build login page Interact with Login Send credentials to Auth API Check credentials / Create token Flag as logged in View rooms Successful login flow Triggers Seam / LayerAction Key: JS/HTML HTTP JAVA Send token USER 🔎 Initial state: • Single page app code loaded into browser • Current state is not logged in Check form is rendered correctly Visual check 🤖 Render room comp.
  • 16. Automation in Testing - © Mark Winteringham - 2019 UI JS API SVC Click login link Build login page Interact with Login Send credentials to Auth API Check credentials / Create token Flag as logged in View rooms Successful login flow Triggers Seam / LayerAction Key: JS/HTML HTTP JAVA Parse credential s Send token 🤖 🔎 Initial state: • Single page app code loaded into browser • Current state is not logged in Check API handles request and response correctly API check USER Render room comp.
  • 17. Automation in Testing - © Mark Winteringham - 2019 Parse credential s UI JS API SVC Click login link Build login page Interact with Login Send credentials to Auth API Check credentials / Create token Flag as logged in View rooms Successful login flow Triggers Seam / LayerAction Key: JS/HTML HTTP JAVA Send token Render room comp. 🤖 🔎 Initial state: • Single page app code loaded into browser • Current state is not logged in Check token is created correctly Unit check USER
  • 18. Automation in Testing - © Mark Winteringham - 2019 Parse credential s UI JS API SVC Click login link Build login page Interact with Login Send credentials to Auth API Check credentials / Create token Flag as logged in View rooms Successful login flow Triggers Seam / LayerAction Key: JS/HTML HTTP JAVA Send token 🤖 🔎 Initial state: • Single page app code loaded into browser • Current state is not logged in Check login page HTML is correct Unit check USER Render room comp.
  • 19. Automation in Testing - © Mark Winteringham - 2019 Visual checks Check form is rendered correctly JavaScript unit checks Backend unit checks Backend API checks Full stack smoke check Check API handles request and response correctly Check login page HTML is correct Check token is created correctly
  • 20. Automation in Testing - © Mark Winteringham - 2019Automation in Testing - © Mark Winteringham - 2019 In Summary
  • 21. Automation in Testing - © Mark Winteringham - 2019 Are your checks TRIMS? Apply task analysis Use task analysis to identify targeted checks Connect checks in a ‘chain of trust’
  • 22. Automation in Testing - © Mark Winteringham - 2019 Mark Winteringham @2bittester www.mwtestconsultancy.co.uk www.automationintesting.com github.com/mwinteringham/restful-booker-platform

Hinweis der Redaktion

  1. In this talk I am going to explore two questions: How do we know if a check is valuable How do we identify and implement valuable checks
  2. So let’s start by working out whether a check is valuable or not. To demonstrate this we’re going to look at an End-to-end, full stack, UI driven, whatever you call it, check. So let’s take a look at our check in action…
  3. To demonstrate how we can use Trims to analyse a check, I’ve created an automated check that follows a typical pattern. It’s designed to check that a user can log into an application so let’s see it in action Demo and run End-to-End check
  4. So let’s analyse that E2E check Is it targeted? Not really. The check is doing everything on the UI layer, meaning if the intention is to check behavior in the backend it’s using the furthest layer from that implementations
  5. Is it reliable? Perhaps. This will be heavily influenced by the state of the application under test BUT this check is working against a complex system with many moving parts of which any one could fail on us. Although that maybe desirable.
  6. Is it informative? Let’s say something in the backend breaks causing our check to fail because it cannot find a specific element. That information is shallow at best and misleading at worst, meaning that it’s going to take considerable time to debug and react to. A risk can have many ways to impact a user
  7. Is it maintainable? Depends on how it was developed, if we are to assume that this check uses page object models, data builder patterns and DRY practices then we could say we’re happy that it’s maintanable
  8. Is it Speedy? Remember speed isn’t just time to run, but time to react to as well. Given that it’s not targeted and not very informative, then it’s fair to say that the feedback loop is going to be slow as we wade through the application and test code to work out what is exactly going on.
  9. We cannot rely on the scope of information from a check, but we can rely on checks if they are: Targeted Reliable Informative Maintainable Or have Speed Speed is not just how fast it runs, but how quickly we can process information and act upon it Lots of small checks that follow those valuable attributes will help us build a picture differently to how we test as humans but hopefully bring us to the same conclusion
  10. So it’s fair to say that that check isn’t up to muster. One of the main issues is that it’s trying to check multiple impacts
  11. What is task analysis? AiT is influenced by Rob Sabourin’s work on Task Analysis Breaking down a task into it’s component parts for analysis Cup of tea example
  12. Let’s see an example Show task analysis model and highlight Left hand side requires some knowledge of the system, but it can vary based on your knowledge Your first iteration could literally be frontend – backend We use task analysis to break down the different events that make up feature that our original risk is focused on So we have points on our model that represent each activity the system does Each action is an opportunity for a targeted check on that section And each action has it’s own inherent risks that may matter to us Finally the lines that cross boundaries between systems are integration risks to check for
  13. So it’s fair to say that that check isn’t up to muster. One of the main issues is that it’s trying to check multiple impacts
  14. This flow successfully captures the areas that could impact our application and realise the risk that a user can’t login. We can use that knowledge to identify targeted checks
  15. This flow successfully captures the areas that could impact our application and realise the risk that a user can’t login. We can use that knowledge to identify targeted checks
  16. This flow successfully captures the areas that could impact our application and realise the risk that a user can’t login. We can use that knowledge to identify targeted checks
  17. This flow successfully captures the areas that could impact our application and realise the risk that a user can’t login. We can use that knowledge to identify targeted checks
  18. So it’s fair to say that that check isn’t up to muster. One of the main issues is that it’s trying to check multiple impacts
  19. In summary Review checks and ask yourself are they TRIMS Break down unwieldy checks by applying task analysis to the system flow that is being covered Use the results of task analysis to determine checks that are more TRIMS Once you have checks in many different points build a ‘chain of trust’ by running them in a pipeline Task analysis can help identify dependencies for mocking