SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Defect Management




                    1
Background: Maysinee
          Nakmanee                      By. Maysinee Nakmanee




Re-engineering Projects-Banking
Center of Software Engineering
Teaching/Guest Speaker for
public/private org.
Thompson-Reuters/Global
Development
– Global configuration management tool
– Global defect tracking tool
(current) DSTi- IFDS Group                       2

– International Financial Development
What is defect?
                                  By. Maysinee Nakmanee




Something wrong in the system
Can we live in the “defect-free” world?
What people can do to prevent the
defect?




                                           3
Defect/Bug Types
                                             By. Maysinee Nakmanee


Mild - misspell output, lack of white space
Moderate - output may be misleading or redundant
Annoying - users need tricks to get system to work
Disturbing - refuses to handle legitimate transaction
Serious - looses track of transaction and its
occurrence
Very serious - bug causes system to incorrect
transaction
Extreme - problem limited to a few user or a few
transaction type, frequent, and arbitrary
Intolerable -long term unrecoverable corruption of
database, system shutdown may need to occur
Infectious - corrupts other systems, system that 4
causes loss of life
Defect Management Process
                                          By. Maysinee Nakmanee



Refer to as “Incident Management Tools”

Prevent Defect
Find the defect as quickly as
possible
Should be
 – Impact analysis
 – Root-cause analysis
 – Improve the process


                                                   5
Defect Reporting
                                      By. Maysinee Nakmanee




Defects are recorded for four major
purpose
– Ensure defect is corrected
– Report status of the application
– Gather statistics used to develop defect
  expectation in future application
– To improve the software development
  process
                                               6
Defect Severity vs. Priority
                                       By. Maysinee Nakmanee



Severity: Defect may be defined as one
that causes data corruption or system crash,
security violation.




Priority: The order in which defects should
be fixed. It is more subjective as it may be
based on input from users regarding which
defects are most important, resources
available, risks.                               7
A sample defect tracking
                        process                              By. Maysinee Nakmanee


I. Run Test


     II. Log Defects


              III. Investigate
                   Defects


                             IV. Defect Resolution Process
                             1.   Priority the correction
                             2.   Schedule the correction
                             3.   Correct the defect
                             4.   Report the resolution
                                                               V. Report
                                                             the resolution
                                                                      8
By. Maysinee Nakmanee




         9
By. Maysinee Nakmanee




“Traceability”




                         10
Traceability of Requirement to
            Testing    By. Maysinee Nakmanee




Traceable from
–   Requirements
–   Planning
–   Development
–   Testing




                               11
Testing
               By. Maysinee Nakmanee




               Testing
             Unit Test
         System Test
     Regression Test
    Stabilization Test
User Acceptance Test
                       12
By. Maysinee Nakmanee




        13
Defect Information
                     By. Maysinee Nakmanee




            What is the
            defects
            Who found
            Who will fix
            In which
            area


                             14
Defect Type           By. Maysinee Nakmanee


        • When testers
          found the defects,
          we need to
          recheck first
          whether it is code
          issue or code
          related or not.
        • Sometimes, it may
          be defect from
          environment from
          data that has
          been conversed
                            15
          but not the code
Root cause of defects                     By. Maysinee Nakmanee




• The most important thing in defect management is to
  be able to identify the root cause of defect in order to
  prevent the future problem.

                                                         16
Priority of defects   By. Maysinee Nakmanee




                              17
Impacted Area
                  By. Maysinee Nakmanee




         Impact: Fix one
         part may affect to
         other parts. This
         may cause
         “Defective fix”
         defect.
         Review of
         impacted area is
         the most
         important before
                        18
         any resolution
Fix Defects
                                  By. Maysinee Nakmanee




Developer needs to provide
–   Resolution
–   When to finish the fix
–   Impacted area
–   Root cause of the defect
–   Unit test result of the fix
Tester needs to
– Re-assure the solution
– Re-test and Close the defect
                                          19
Fix Defects
                                   By. Maysinee Nakmanee




Would that be possible that some
defects have never been fixed?
What will affect to the system?
Why we do that?




                                           20
Defect Metrics
                 By. Maysinee Nakmanee




                         21
Defects Metrics
                                By. Maysinee Nakmanee




Phase Injected
Phase found
How many priority defects
How quick we can resolve the defects
Root cause of the defects
How long a defect has been openned

                                        22
Defect Management
                                    By. Maysinee Nakmanee




Collaboration between all parties
–   Developers
–   Testes
–   Business Analyst
–   System Analyst
Sometimes, Fix is a nice to have but
may not be a need to do

                                            23
Defects as requirements
                                  By. Maysinee Nakmanee




Collection of defects from previous
release/version can be come
requirements for next release.
– Production issue defects
– Minor defects




                                          24
Summary
                                      By. Maysinee Nakmanee




Defect management is the most important
process that all stakeholders need to aware
of.

Considering defect information to support
defect management.




                                              25

Contenu connexe

Tendances

software project management Software inspection
software project management Software inspectionsoftware project management Software inspection
software project management Software inspectionREHMAT ULLAH
 
Defect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect ManagementDefect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect Managementguest476528
 
Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Techpartnerz
 
From Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionFrom Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionSune Gynthersen
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!SQALab
 
Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!TechWell
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testingToshi Patel
 
Defect prevention techniques
Defect prevention techniquesDefect prevention techniques
Defect prevention techniquesZarko Acimovic
 
Risk-based Testing
Risk-based TestingRisk-based Testing
Risk-based TestingJohan Hoberg
 
Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Neil Thompson
 
Risks of Risk-Based Testing
Risks of Risk-Based TestingRisks of Risk-Based Testing
Risks of Risk-Based Testingrrice2000
 
Risk based testing - Final
Risk based testing - FinalRisk based testing - Final
Risk based testing - FinalKuldeep Kumar
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of DefectsDavid Gevorgyan
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software TestersTechWell
 
Fundamentals of Risk-based Testing
Fundamentals of Risk-based TestingFundamentals of Risk-based Testing
Fundamentals of Risk-based TestingTechWell
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods deep sharma
 

Tendances (20)

software project management Software inspection
software project management Software inspectionsoftware project management Software inspection
software project management Software inspection
 
Defect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect ManagementDefect MgmtBugDay Bangkok 2009: Defect Management
Defect MgmtBugDay Bangkok 2009: Defect Management
 
Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3
 
Defect prevention
Defect preventionDefect prevention
Defect prevention
 
From Defect Reporting To Defect Prevention
From Defect Reporting To Defect PreventionFrom Defect Reporting To Defect Prevention
From Defect Reporting To Defect Prevention
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!
 
Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!Develop a Defect Prevention Strategy—or Else!
Develop a Defect Prevention Strategy—or Else!
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testing
 
Defect prevention techniques
Defect prevention techniquesDefect prevention techniques
Defect prevention techniques
 
Risk-based Testing
Risk-based TestingRisk-based Testing
Risk-based Testing
 
Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)
 
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
[HCMC STC Jan 2015] Risk-Based Software Testing Approaches
 
Risks of Risk-Based Testing
Risks of Risk-Based TestingRisks of Risk-Based Testing
Risks of Risk-Based Testing
 
Risk based testing - Final
Risk based testing - FinalRisk based testing - Final
Risk based testing - Final
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of Defects
 
Root Cause Analysis for Software Testers
Root Cause Analysis for Software TestersRoot Cause Analysis for Software Testers
Root Cause Analysis for Software Testers
 
Fundamentals of Risk-based Testing
Fundamentals of Risk-based TestingFundamentals of Risk-based Testing
Fundamentals of Risk-based Testing
 
Test management
Test managementTest management
Test management
 
Defect analysis and prevention methods
Defect analysis and prevention methods Defect analysis and prevention methods
Defect analysis and prevention methods
 
Istqb chapter 5
Istqb chapter 5Istqb chapter 5
Istqb chapter 5
 

Similaire à BugDay Bangkok 2009 Defect Management

Classic Testing Mistakes 0226
Classic Testing Mistakes 0226Classic Testing Mistakes 0226
Classic Testing Mistakes 0226MBA_Community
 
Tool Box Talk - Human Induced Failures 2
Tool Box Talk  - Human Induced Failures  2Tool Box Talk  - Human Induced Failures  2
Tool Box Talk - Human Induced Failures 2Ricky Smith CMRP, CMRT
 
Root cause analysis master plan
Root cause analysis master planRoot cause analysis master plan
Root cause analysis master planGlen Alleman
 
Dan Cornell - The Real Cost of Software Remediation
Dan Cornell  - The Real Cost of Software RemediationDan Cornell  - The Real Cost of Software Remediation
Dan Cornell - The Real Cost of Software RemediationSource Conference
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software RemediationDenim Group
 
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…Dario Spinola
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management Argyle Executive Forum
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptxsuresh667793
 
Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...vcuniversity
 
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudApica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudRightScale
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGrant Swanson
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment TechniquesDenim Group
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingCenzic
 
Reducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsReducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsWilde Analysis Ltd.
 
Performance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudPerformance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudRightScale
 
Yale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full SlidesYale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full Slidesssusercc0cac
 
Maintenance101_for_Linkedin
Maintenance101_for_LinkedinMaintenance101_for_Linkedin
Maintenance101_for_LinkedinDavid Trewartha
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedThomas Zimmermann
 

Similaire à BugDay Bangkok 2009 Defect Management (20)

Classic Testing Mistakes 0226
Classic Testing Mistakes 0226Classic Testing Mistakes 0226
Classic Testing Mistakes 0226
 
Tool Box Talk - Human Induced Failures 2
Tool Box Talk  - Human Induced Failures  2Tool Box Talk  - Human Induced Failures  2
Tool Box Talk - Human Induced Failures 2
 
Root cause analysis master plan
Root cause analysis master planRoot cause analysis master plan
Root cause analysis master plan
 
Dan Cornell - The Real Cost of Software Remediation
Dan Cornell  - The Real Cost of Software RemediationDan Cornell  - The Real Cost of Software Remediation
Dan Cornell - The Real Cost of Software Remediation
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
 
The key to improving your availability is fracas
The key to improving your availability is fracasThe key to improving your availability is fracas
The key to improving your availability is fracas
 
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…Toyota Kata -  from "Lean Implementation" to a "lasting Lean Transformatio…
Toyota Kata - from "Lean Implementation" to a "lasting Lean Transformatio…
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Problem Solving1.pptx
Problem Solving1.pptxProblem Solving1.pptx
Problem Solving1.pptx
 
Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...Test, re-test and test again – New techniques and technologies for testing id...
Test, re-test and test again – New techniques and technologies for testing id...
 
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the CloudApica - Performance Does Matter: Five Key Elements to Consider in the Cloud
Apica - Performance Does Matter: Five Key Elements to Consider in the Cloud
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance Monitoring
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security Testing
 
Presentation2
Presentation2Presentation2
Presentation2
 
Reducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering MethodsReducing Product Development Risk with Reliability Engineering Methods
Reducing Product Development Risk with Reliability Engineering Methods
 
Performance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the CloudPerformance and Success: Key Elements to Consider in the Cloud
Performance and Success: Key Elements to Consider in the Cloud
 
Yale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full SlidesYale FMEA Introduction Lecture Full Slides
Yale FMEA Introduction Lecture Full Slides
 
Maintenance101_for_Linkedin
Maintenance101_for_LinkedinMaintenance101_for_Linkedin
Maintenance101_for_Linkedin
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

BugDay Bangkok 2009 Defect Management

  • 2. Background: Maysinee Nakmanee By. Maysinee Nakmanee Re-engineering Projects-Banking Center of Software Engineering Teaching/Guest Speaker for public/private org. Thompson-Reuters/Global Development – Global configuration management tool – Global defect tracking tool (current) DSTi- IFDS Group 2 – International Financial Development
  • 3. What is defect? By. Maysinee Nakmanee Something wrong in the system Can we live in the “defect-free” world? What people can do to prevent the defect? 3
  • 4. Defect/Bug Types By. Maysinee Nakmanee Mild - misspell output, lack of white space Moderate - output may be misleading or redundant Annoying - users need tricks to get system to work Disturbing - refuses to handle legitimate transaction Serious - looses track of transaction and its occurrence Very serious - bug causes system to incorrect transaction Extreme - problem limited to a few user or a few transaction type, frequent, and arbitrary Intolerable -long term unrecoverable corruption of database, system shutdown may need to occur Infectious - corrupts other systems, system that 4 causes loss of life
  • 5. Defect Management Process By. Maysinee Nakmanee Refer to as “Incident Management Tools” Prevent Defect Find the defect as quickly as possible Should be – Impact analysis – Root-cause analysis – Improve the process 5
  • 6. Defect Reporting By. Maysinee Nakmanee Defects are recorded for four major purpose – Ensure defect is corrected – Report status of the application – Gather statistics used to develop defect expectation in future application – To improve the software development process 6
  • 7. Defect Severity vs. Priority By. Maysinee Nakmanee Severity: Defect may be defined as one that causes data corruption or system crash, security violation. Priority: The order in which defects should be fixed. It is more subjective as it may be based on input from users regarding which defects are most important, resources available, risks. 7
  • 8. A sample defect tracking process By. Maysinee Nakmanee I. Run Test II. Log Defects III. Investigate Defects IV. Defect Resolution Process 1. Priority the correction 2. Schedule the correction 3. Correct the defect 4. Report the resolution V. Report the resolution 8
  • 11. Traceability of Requirement to Testing By. Maysinee Nakmanee Traceable from – Requirements – Planning – Development – Testing 11
  • 12. Testing By. Maysinee Nakmanee Testing Unit Test System Test Regression Test Stabilization Test User Acceptance Test 12
  • 14. Defect Information By. Maysinee Nakmanee What is the defects Who found Who will fix In which area 14
  • 15. Defect Type By. Maysinee Nakmanee • When testers found the defects, we need to recheck first whether it is code issue or code related or not. • Sometimes, it may be defect from environment from data that has been conversed 15 but not the code
  • 16. Root cause of defects By. Maysinee Nakmanee • The most important thing in defect management is to be able to identify the root cause of defect in order to prevent the future problem. 16
  • 17. Priority of defects By. Maysinee Nakmanee 17
  • 18. Impacted Area By. Maysinee Nakmanee Impact: Fix one part may affect to other parts. This may cause “Defective fix” defect. Review of impacted area is the most important before 18 any resolution
  • 19. Fix Defects By. Maysinee Nakmanee Developer needs to provide – Resolution – When to finish the fix – Impacted area – Root cause of the defect – Unit test result of the fix Tester needs to – Re-assure the solution – Re-test and Close the defect 19
  • 20. Fix Defects By. Maysinee Nakmanee Would that be possible that some defects have never been fixed? What will affect to the system? Why we do that? 20
  • 21. Defect Metrics By. Maysinee Nakmanee 21
  • 22. Defects Metrics By. Maysinee Nakmanee Phase Injected Phase found How many priority defects How quick we can resolve the defects Root cause of the defects How long a defect has been openned 22
  • 23. Defect Management By. Maysinee Nakmanee Collaboration between all parties – Developers – Testes – Business Analyst – System Analyst Sometimes, Fix is a nice to have but may not be a need to do 23
  • 24. Defects as requirements By. Maysinee Nakmanee Collection of defects from previous release/version can be come requirements for next release. – Production issue defects – Minor defects 24
  • 25. Summary By. Maysinee Nakmanee Defect management is the most important process that all stakeholders need to aware of. Considering defect information to support defect management. 25