SlideShare a Scribd company logo
1 of 29
Download to read offline
Finally… Reliable
Software!
Bryan Bakker
Eindhoven 2015
bryan.bakker@sioux.eu
@Bryan_Bakker
Contents
 Intro
 Reliability
 Four step model
 Different steps in detail
 Conclusion
© Sioux 2015 | Confidential | 2
Thanks
Thanks to:
 Rob de Bie
 René van den Eertwegh
 Peter Wijnhoven
© Sioux 2015 | Confidential | 3
About Bryan Bakker
 Test Expert
 Certifications: ISTQB, TMap, Prince2
 Member of ISTQB Expert Level on Test Automation
 Tutor of several test related courses
 Domains: medical systems, professional security
systems, semi-industry, electron microscopy
 Specialties: test automation, integration testing, design
for testability, reliability testing
© Sioux 2015 | Confidential | 4
About Sioux
HERENTALS
NUENEN
EINDHOVEN
UTRECHT MOSCOW
© Sioux 2015 | Confidential | 5
DANANG
 Did you ever experience unreliable software?
Reliability
© Sioux 2015 | Confidential | 6
Reliability
 What is reliability?
“Software Reliability is the probability of failure-
free software operation in a specified
environment for a specified period of time.”
IEEE 729
In short:
 Something can be functional correct
 But is it reliable? © Sioux 2015 | Confidential | 7
Reliability
 What is reliability?
“Software Reliability is the probability of failure-
free software operation in a specified
environment for a specified period of time.”
IEEE 729
In short:
 Something can be functional correct
 But is it reliable? How reliable is it? © Sioux 2015 | Confidential | 8
Four steps
© Sioux 2015 | Confidential | 9
Example: Security and Surveillance System
 Cameras
 Recording
 Event Handling
Define user domain reliability targets:
 Define customer profiles
 Identify operation modes and critical
functions
 Determine reliability requirements per
operation mode / critical function
First step
© Sioux 2015 | Confidential | 10
 Define customer profiles
 ATM security
First step
© Sioux 2015 | Confidential | 11
 Define customer profiles
 ATM security
 Parking lot surveillance
First step
© Sioux 2015 | Confidential | 12
 Define customer profiles
 ATM security
 Parking lot surveillance
 Airport surveillance
First step
© Sioux 2015 | Confidential | 13
 Identify operation modes and critical
functions
 Recording mode
 Playback mode
 Auto-start (critical)
 Out-of-the-box
 User triggered
 Software reset
First step
© Sioux 2015 | Confidential | 14
 Determine reliability requirements per
operation mode / critical function
 Segment between 0.5s and 2s missed
 failure rate ≤1x per day
 Playback command does not function as expected
 failure rate ≤ 1x per hour of viewing
 Not auto-started  failure rate ≤ 3 * 10-7
failures/restart
First step
© Sioux 2015 | Confidential | 15
 Define operational profile for
user functions
 Decompose software reliability targets
 Decompose operational profile with
probabilities per component
Second step
© Sioux 2015 | Confidential | 16
 How will the product be used by
customers?
 Focus development resources based
on expected usage
 Operational profile: a quantitative
characterization of how a system will be used
 Developed by John Musa
 To be used for development and test
activities
 Also very useful for reliability
Operational profile
© Sioux 2015 | Confidential | 17
 Critical functions can be missed in
operational profiles.
 Treat them separately!
What about?
© Sioux 2015 | Confidential | 18
 Define operational profile for
user functions
Second step
© Sioux 2015 | Confidential | 19
 Decompose software reliability targets
 Not auto-started  failure rate <= 3 * 10-7
failures/restart
 Stream Handler contribution: 20%
 “Target” = 0.6 * 10-7 failures / restart
Second step
© Sioux 2015 | Confidential | 20
Focus on Stream
Handler
component
 Decompose operational profile with
probabilities per component
Second step
© Sioux 2015 | Confidential | 21
Playback function Occurrence Probability % Stream Handler commands
Play / Pause (toggle) 48 out of 100 48% Start / Stop Playback
Fast forward 20 out of 100 20% Start Playback
Fast reverse 20 out of 100 20% Start Playback
Setup playback
windows
10 out of 100 10% Stop / Start Playback
Search and select
event for playback
2 out of 100 2% Start Playback with time
stamp = time of selected
event
 Define the engineering processes
 Process steps to prevent reliability
faults
 Process steps to detect reliability faults
 Design choices to minimize effects of faults
Next steps
© Sioux 2015 | Confidential | 22
 Measure software reliability growth
 Design and execute reliability tests
 Based on the operational profiles
 Randomly execute test set according to the
operation profile
 Extra focus on critical functions
 Visualize reliability growths
Next steps
© Sioux 2015 | Confidential | 23
 Reliability growth curve
Next steps
© Sioux 2015 | Confidential | 24
Conclusion
 Reliability is not binary but a characteristic
that can be measured
 Based on theory of John Musa
 Practical 4 step approach
 Reliability is not reached by accident
 For a full description and worked out case
study, see next page…
© Sioux 2015 | Confidential | 25
Questions
© Sioux 2015 | Confidential | 26
Published February 2015:
www.amazon.com
ISBN: 978-1499226669
Rob de Bie
Bryan Bakker
René van den Eertwegh
Peter Wijnhoven
 Backup slides
© Sioux 2015 | Confidential | 27
Reliability Curves
 Bathtub curve
Hardware Reliability
 Sawtooth curve
Software Reliability
© Sioux 2015 | Confidential | 28
29© Sioux 2015 | Confidential |
www.sioux.eu
bryan.bakker@sioux.eu
+31 (0)40 26 77 100

More Related Content

What's hot

Magenic-White-Paper-Continuous-Inegration-for-QA-Teams
Magenic-White-Paper-Continuous-Inegration-for-QA-TeamsMagenic-White-Paper-Continuous-Inegration-for-QA-Teams
Magenic-White-Paper-Continuous-Inegration-for-QA-Teams
Aaron Humerickhouse
 

What's hot (20)

Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech Solutions
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch management
 
ITA Presentation 2010
ITA Presentation 2010ITA Presentation 2010
ITA Presentation 2010
 
Magenic-White-Paper-Continuous-Inegration-for-QA-Teams
Magenic-White-Paper-Continuous-Inegration-for-QA-TeamsMagenic-White-Paper-Continuous-Inegration-for-QA-Teams
Magenic-White-Paper-Continuous-Inegration-for-QA-Teams
 
Key Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps ReportKey Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps Report
 
1, 2, 3 build - continuous integration for mobile apps
1, 2, 3   build - continuous integration for mobile apps1, 2, 3   build - continuous integration for mobile apps
1, 2, 3 build - continuous integration for mobile apps
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
 
I safety ppt
I safety ppt I safety ppt
I safety ppt
 
Emergency Access Management
Emergency Access ManagementEmergency Access Management
Emergency Access Management
 
10 Warning Signs of Weak Requirements Management
10 Warning Signs of Weak Requirements Management10 Warning Signs of Weak Requirements Management
10 Warning Signs of Weak Requirements Management
 
Secured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsSecured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant Assets
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshare
 
Blancco Mobile Diagnostics
Blancco Mobile DiagnosticsBlancco Mobile Diagnostics
Blancco Mobile Diagnostics
 
Take your code and quality to the next level by Serena Software
Take your code and quality to the next level by Serena SoftwareTake your code and quality to the next level by Serena Software
Take your code and quality to the next level by Serena Software
 
Monitoring & Observability
Monitoring & ObservabilityMonitoring & Observability
Monitoring & Observability
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Introduction to Software Failure Modes Effects Analysis
Introduction to Software Failure Modes Effects AnalysisIntroduction to Software Failure Modes Effects Analysis
Introduction to Software Failure Modes Effects Analysis
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Building the Digital Bank
Building the Digital BankBuilding the Digital Bank
Building the Digital Bank
 
MidoNet roadmap
MidoNet roadmapMidoNet roadmap
MidoNet roadmap
 

Similar to Finally… reliable software!

Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Kevin Fealey
 
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
TEST Huddle
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Kai Wähner
 

Similar to Finally… reliable software! (20)

Mdd test qa_test2014_bryan_bakker
Mdd test qa_test2014_bryan_bakkerMdd test qa_test2014_bryan_bakker
Mdd test qa_test2014_bryan_bakker
 
Enabling Mobility through Continuous Delivery
Enabling Mobility through Continuous DeliveryEnabling Mobility through Continuous Delivery
Enabling Mobility through Continuous Delivery
 
Reliability Levels of Subsea Production Systems During Operations
Reliability Levels of Subsea Production Systems During OperationsReliability Levels of Subsea Production Systems During Operations
Reliability Levels of Subsea Production Systems During Operations
 
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennai
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentation
 
Implement an Enterprise Performance Test Process
Implement an Enterprise Performance Test ProcessImplement an Enterprise Performance Test Process
Implement an Enterprise Performance Test Process
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
 
Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development
 
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
 
Continuous Automation and its Impact on the CI_CD Pipeline.pdf
Continuous Automation and its Impact on the CI_CD Pipeline.pdfContinuous Automation and its Impact on the CI_CD Pipeline.pdf
Continuous Automation and its Impact on the CI_CD Pipeline.pdf
 
The quality assurance checklist for progressive testing
The quality assurance checklist for progressive testingThe quality assurance checklist for progressive testing
The quality assurance checklist for progressive testing
 
The Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive TestingThe Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive Testing
 
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
 
How to deploy AppInternals in azure
How to deploy AppInternals in azureHow to deploy AppInternals in azure
How to deploy AppInternals in azure
 
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPT
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPTManaging Your ROI & TCO In Automation Testing | V&V Webinar PPT
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPT
 
How to build confidence in your release cycle
How to build confidence in your release cycleHow to build confidence in your release cycle
How to build confidence in your release cycle
 
Software Testing - Online Guide
Software Testing - Online GuideSoftware Testing - Online Guide
Software Testing - Online Guide
 
Implementing Continuous Integration to Improve Software Quality
Implementing Continuous Integration to Improve Software QualityImplementing Continuous Integration to Improve Software Quality
Implementing Continuous Integration to Improve Software Quality
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 

More from nextbuild (13)

Aws microservice keynote
Aws microservice keynoteAws microservice keynote
Aws microservice keynote
 
How invariants help writing loops
How invariants help writing loopsHow invariants help writing loops
How invariants help writing loops
 
A first taste of integration with Apache Camel
A first taste of integration with Apache CamelA first taste of integration with Apache Camel
A first taste of integration with Apache Camel
 
Effective code reviews
Effective code reviewsEffective code reviews
Effective code reviews
 
Microservices in the real world
Microservices in the real worldMicroservices in the real world
Microservices in the real world
 
Asp.net in a new world
Asp.net in a new worldAsp.net in a new world
Asp.net in a new world
 
Meteor - building an email client
Meteor - building an email clientMeteor - building an email client
Meteor - building an email client
 
Swimming upstream in the container revolution
Swimming upstream in the container revolutionSwimming upstream in the container revolution
Swimming upstream in the container revolution
 
Event sourcing your AngularJS applications
Event sourcing your AngularJS applicationsEvent sourcing your AngularJS applications
Event sourcing your AngularJS applications
 
Make color schemes a no brainer with sass
Make color schemes a no brainer with sassMake color schemes a no brainer with sass
Make color schemes a no brainer with sass
 
Cqrs from the trenches
Cqrs from the trenchesCqrs from the trenches
Cqrs from the trenches
 
Architecting for the cloud
Architecting for the cloudArchitecting for the cloud
Architecting for the cloud
 
Cucumber spec - a tool takes your bdd to the next level
Cucumber spec - a tool takes your bdd to the next levelCucumber spec - a tool takes your bdd to the next level
Cucumber spec - a tool takes your bdd to the next level
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Recently uploaded (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Finally… reliable software!

  • 1. Finally… Reliable Software! Bryan Bakker Eindhoven 2015 bryan.bakker@sioux.eu @Bryan_Bakker
  • 2. Contents  Intro  Reliability  Four step model  Different steps in detail  Conclusion © Sioux 2015 | Confidential | 2
  • 3. Thanks Thanks to:  Rob de Bie  René van den Eertwegh  Peter Wijnhoven © Sioux 2015 | Confidential | 3
  • 4. About Bryan Bakker  Test Expert  Certifications: ISTQB, TMap, Prince2  Member of ISTQB Expert Level on Test Automation  Tutor of several test related courses  Domains: medical systems, professional security systems, semi-industry, electron microscopy  Specialties: test automation, integration testing, design for testability, reliability testing © Sioux 2015 | Confidential | 4
  • 5. About Sioux HERENTALS NUENEN EINDHOVEN UTRECHT MOSCOW © Sioux 2015 | Confidential | 5 DANANG
  • 6.  Did you ever experience unreliable software? Reliability © Sioux 2015 | Confidential | 6
  • 7. Reliability  What is reliability? “Software Reliability is the probability of failure- free software operation in a specified environment for a specified period of time.” IEEE 729 In short:  Something can be functional correct  But is it reliable? © Sioux 2015 | Confidential | 7
  • 8. Reliability  What is reliability? “Software Reliability is the probability of failure- free software operation in a specified environment for a specified period of time.” IEEE 729 In short:  Something can be functional correct  But is it reliable? How reliable is it? © Sioux 2015 | Confidential | 8
  • 9. Four steps © Sioux 2015 | Confidential | 9 Example: Security and Surveillance System  Cameras  Recording  Event Handling
  • 10. Define user domain reliability targets:  Define customer profiles  Identify operation modes and critical functions  Determine reliability requirements per operation mode / critical function First step © Sioux 2015 | Confidential | 10
  • 11.  Define customer profiles  ATM security First step © Sioux 2015 | Confidential | 11
  • 12.  Define customer profiles  ATM security  Parking lot surveillance First step © Sioux 2015 | Confidential | 12
  • 13.  Define customer profiles  ATM security  Parking lot surveillance  Airport surveillance First step © Sioux 2015 | Confidential | 13
  • 14.  Identify operation modes and critical functions  Recording mode  Playback mode  Auto-start (critical)  Out-of-the-box  User triggered  Software reset First step © Sioux 2015 | Confidential | 14
  • 15.  Determine reliability requirements per operation mode / critical function  Segment between 0.5s and 2s missed  failure rate ≤1x per day  Playback command does not function as expected  failure rate ≤ 1x per hour of viewing  Not auto-started  failure rate ≤ 3 * 10-7 failures/restart First step © Sioux 2015 | Confidential | 15
  • 16.  Define operational profile for user functions  Decompose software reliability targets  Decompose operational profile with probabilities per component Second step © Sioux 2015 | Confidential | 16
  • 17.  How will the product be used by customers?  Focus development resources based on expected usage  Operational profile: a quantitative characterization of how a system will be used  Developed by John Musa  To be used for development and test activities  Also very useful for reliability Operational profile © Sioux 2015 | Confidential | 17
  • 18.  Critical functions can be missed in operational profiles.  Treat them separately! What about? © Sioux 2015 | Confidential | 18
  • 19.  Define operational profile for user functions Second step © Sioux 2015 | Confidential | 19
  • 20.  Decompose software reliability targets  Not auto-started  failure rate <= 3 * 10-7 failures/restart  Stream Handler contribution: 20%  “Target” = 0.6 * 10-7 failures / restart Second step © Sioux 2015 | Confidential | 20 Focus on Stream Handler component
  • 21.  Decompose operational profile with probabilities per component Second step © Sioux 2015 | Confidential | 21 Playback function Occurrence Probability % Stream Handler commands Play / Pause (toggle) 48 out of 100 48% Start / Stop Playback Fast forward 20 out of 100 20% Start Playback Fast reverse 20 out of 100 20% Start Playback Setup playback windows 10 out of 100 10% Stop / Start Playback Search and select event for playback 2 out of 100 2% Start Playback with time stamp = time of selected event
  • 22.  Define the engineering processes  Process steps to prevent reliability faults  Process steps to detect reliability faults  Design choices to minimize effects of faults Next steps © Sioux 2015 | Confidential | 22
  • 23.  Measure software reliability growth  Design and execute reliability tests  Based on the operational profiles  Randomly execute test set according to the operation profile  Extra focus on critical functions  Visualize reliability growths Next steps © Sioux 2015 | Confidential | 23
  • 24.  Reliability growth curve Next steps © Sioux 2015 | Confidential | 24
  • 25. Conclusion  Reliability is not binary but a characteristic that can be measured  Based on theory of John Musa  Practical 4 step approach  Reliability is not reached by accident  For a full description and worked out case study, see next page… © Sioux 2015 | Confidential | 25
  • 26. Questions © Sioux 2015 | Confidential | 26 Published February 2015: www.amazon.com ISBN: 978-1499226669 Rob de Bie Bryan Bakker René van den Eertwegh Peter Wijnhoven
  • 27.  Backup slides © Sioux 2015 | Confidential | 27
  • 28. Reliability Curves  Bathtub curve Hardware Reliability  Sawtooth curve Software Reliability © Sioux 2015 | Confidential | 28
  • 29. 29© Sioux 2015 | Confidential | www.sioux.eu bryan.bakker@sioux.eu +31 (0)40 26 77 100