SlideShare une entreprise Scribd logo
1  sur  25
Defect Management
Background: Maysinee Nakmanee ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is defect? ,[object Object],[object Object],[object Object]
Defect/Bug Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defect Management Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defect Reporting ,[object Object],[object Object],[object Object],[object Object],[object Object]
Defect Severity vs. Priority ,[object Object],[object Object]
A sample defect tracking process I. Run Test II. Log Defects III. Investigate Defects ,[object Object],[object Object],[object Object],[object Object],[object Object],V. Report  the resolution
 
“ Traceability”
Traceability of Requirement to Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Testing Testing Unit Test System Test Regression Test Stabilization Test User Acceptance Test
 
Defect Information ,[object Object],[object Object],[object Object],[object Object]
Defect Type ,[object Object],[object Object]
Root cause of defects ,[object Object]
Priority of defects
Impacted Area ,[object Object],[object Object]
Fix Defects ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fix Defects ,[object Object],[object Object],[object Object]
Defect Metrics
Defects Metrics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defect Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defects as requirements ,[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object]

Contenu connexe

Tendances

Defect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsDefect Analytics & Statistical Trends
Defect Analytics & Statistical Trends
Mani Nutulapati
 
Software validation
Software validationSoftware validation
Software validation
Robert Phe
 

Tendances (20)

Defect Prevention
Defect PreventionDefect Prevention
Defect Prevention
 
Defect prevention
Defect preventionDefect prevention
Defect prevention
 
Defect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsDefect Analytics & Statistical Trends
Defect Analytics & Statistical Trends
 
StarWest 2012 - Agile Defect Management: Focus On Prevention
StarWest 2012 - Agile Defect Management: Focus On PreventionStarWest 2012 - Agile Defect Management: Focus On Prevention
StarWest 2012 - Agile Defect Management: Focus On Prevention
 
Effective test coverage Techniques
Effective test coverage TechniquesEffective test coverage Techniques
Effective test coverage Techniques
 
Principles of Software testing
Principles of Software testingPrinciples of Software testing
Principles of Software testing
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testing
 
An Overview of User Acceptance Testing (UAT)
An Overview of User Acceptance Testing (UAT)An Overview of User Acceptance Testing (UAT)
An Overview of User Acceptance Testing (UAT)
 
Negative Testing
Negative TestingNegative Testing
Negative Testing
 
USER ACCEPTANCE TESTING
USER ACCEPTANCE TESTINGUSER ACCEPTANCE TESTING
USER ACCEPTANCE TESTING
 
Importance of a Test Management Tool for Your Project
Importance of a Test Management Tool for Your ProjectImportance of a Test Management Tool for Your Project
Importance of a Test Management Tool for Your Project
 
What is Ad-Hoc Testing
What is Ad-Hoc TestingWhat is Ad-Hoc Testing
What is Ad-Hoc Testing
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Software Testing Life Cycle – A Beginner’s Guide
Software Testing Life Cycle – A Beginner’s GuideSoftware Testing Life Cycle – A Beginner’s Guide
Software Testing Life Cycle – A Beginner’s Guide
 
Software testing
Software testingSoftware testing
Software testing
 
1 testing fundamentals
1 testing fundamentals1 testing fundamentals
1 testing fundamentals
 
Tlc
TlcTlc
Tlc
 
Istqb chapter 5
Istqb chapter 5Istqb chapter 5
Istqb chapter 5
 
CTFL Module 01
CTFL Module 01CTFL Module 01
CTFL Module 01
 
Software validation
Software validationSoftware validation
Software validation
 

En vedette

TESTING LIFE CYCLE PPT
TESTING LIFE CYCLE PPTTESTING LIFE CYCLE PPT
TESTING LIFE CYCLE PPT
suhasreddy1
 

En vedette (6)

Scott-tiger generel introduktion af Ole Kramer, Scott-tiger
Scott-tiger generel introduktion af Ole Kramer, Scott-tigerScott-tiger generel introduktion af Ole Kramer, Scott-tiger
Scott-tiger generel introduktion af Ole Kramer, Scott-tiger
 
IEEE - Cost Of Correcting Defects
IEEE - Cost Of Correcting DefectsIEEE - Cost Of Correcting Defects
IEEE - Cost Of Correcting Defects
 
Defect management using kanban
Defect management using kanbanDefect management using kanban
Defect management using kanban
 
Software Testing - Defect Metrics & Analysis
Software Testing - Defect Metrics & AnalysisSoftware Testing - Defect Metrics & Analysis
Software Testing - Defect Metrics & Analysis
 
Tips for Writing Better Charters for Exploratory Testing Sessions by Michael...
 Tips for Writing Better Charters for Exploratory Testing Sessions by Michael... Tips for Writing Better Charters for Exploratory Testing Sessions by Michael...
Tips for Writing Better Charters for Exploratory Testing Sessions by Michael...
 
TESTING LIFE CYCLE PPT
TESTING LIFE CYCLE PPTTESTING LIFE CYCLE PPT
TESTING LIFE CYCLE PPT
 

Similaire à Defect MgmtBugDay Bangkok 2009: Defect Management

Defect correction-Software Testing
Defect correction-Software TestingDefect correction-Software Testing
Defect correction-Software Testing
mrinmoy mukherjee
 
IT 381_Chap hubybybybybybybytggyguh7h7_7.ppt
IT 381_Chap hubybybybybybybytggyguh7h7_7.pptIT 381_Chap hubybybybybybybytggyguh7h7_7.ppt
IT 381_Chap hubybybybybybybytggyguh7h7_7.ppt
ksujith0034
 
Apply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxApply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptx
wesendesta2
 

Similaire à Defect MgmtBugDay Bangkok 2009: Defect Management (20)

Defect correction-Software Testing
Defect correction-Software TestingDefect correction-Software Testing
Defect correction-Software Testing
 
ISTQBCH1 Manual Testing.pptx
ISTQBCH1 Manual Testing.pptxISTQBCH1 Manual Testing.pptx
ISTQBCH1 Manual Testing.pptx
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in software
 
Deal With Production Issues - The ITIL Way
Deal With Production Issues - The ITIL WayDeal With Production Issues - The ITIL Way
Deal With Production Issues - The ITIL Way
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Fundamentals of Testing - Andika Dwi Ary Candra
Fundamentals of Testing - Andika Dwi Ary CandraFundamentals of Testing - Andika Dwi Ary Candra
Fundamentals of Testing - Andika Dwi Ary Candra
 
Fundamental Of Testing (Dhea Frizky)
Fundamental Of Testing (Dhea Frizky)Fundamental Of Testing (Dhea Frizky)
Fundamental Of Testing (Dhea Frizky)
 
Ch20
Ch20Ch20
Ch20
 
Fundamentals of testing
Fundamentals of testingFundamentals of testing
Fundamentals of testing
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptx
 
FMEA
FMEAFMEA
FMEA
 
IT 381_Chap_7.ppt
IT 381_Chap_7.pptIT 381_Chap_7.ppt
IT 381_Chap_7.ppt
 
Failure mode effects analysis, Computer Integrated Manufacturing, Quality fun...
Failure mode effects analysis, Computer Integrated Manufacturing, Quality fun...Failure mode effects analysis, Computer Integrated Manufacturing, Quality fun...
Failure mode effects analysis, Computer Integrated Manufacturing, Quality fun...
 
FMEA presentation for research and development
FMEA presentation for research and developmentFMEA presentation for research and development
FMEA presentation for research and development
 
FMEA análise e odos de falhas e seus efeitos.ppt
FMEA análise e odos de falhas e seus efeitos.pptFMEA análise e odos de falhas e seus efeitos.ppt
FMEA análise e odos de falhas e seus efeitos.ppt
 
IT 381_Chap hubybybybybybybytggyguh7h7_7.ppt
IT 381_Chap hubybybybybybybytggyguh7h7_7.pptIT 381_Chap hubybybybybybybytggyguh7h7_7.ppt
IT 381_Chap hubybybybybybybytggyguh7h7_7.ppt
 
Failure modes effect analysis
Failure modes effect analysisFailure modes effect analysis
Failure modes effect analysis
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk Analysis
 
Apply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptxApply Problem Solving Techniques to Routine Malfunctions.pptx
Apply Problem Solving Techniques to Routine Malfunctions.pptx
 
How Severe Is Your Bug?
How Severe Is Your Bug?How Severe Is Your Bug?
How Severe Is Your Bug?
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Defect MgmtBugDay Bangkok 2009: Defect Management