SlideShare a Scribd company logo
1 of 14
CONFIDENTIAL
Discussion Paper of :Discussion Paper of :
Bug TrackingBug Tracking
Prep.By : Deny PrasetiaPrep.By : Deny Prasetia
January 12th
2013, Rev.00.
PT. Berlian Sistem Informasi
CONFIDENTIAL
2 of 14
Outline:
• Introduction
• What is a Bug?
• What is a Bug Tracking?
• Consideration Regarding Bug Tracking
• Bug Tracking Tool
• Anatomy of Bug
• Lifecycle of Bug
• Benefit of Bug Tracking Tool
• Common Issues of Bug Tracking Tool
• What Should You Look For In Bug Tracking Tool
• The Most Popular of Bug Tracking Systems (BTS)
• Comment & Opinion
I will explain about ….
CONFIDENTIAL
3 of 14
Introduction:
 What is a "Bug” (read: “Computer/ Software Bug”) ?
 Wikipedia offers a good literature:
• A computer bug is any problem with a computer, whether caused by
software or hardware. (source:
http://en.wikipedia.org/wiki/Computer_bug)
• Bug (software bug) - an error, flaw, mistake, "undocumented feature",
failure, or fault in a computer program that prevents it from behaving as
intended (e.g., producing an incorrect result). (source: “A study
concerning the bug tracking applications “ – Journal – Prof. Dr.
Christian Bac – Telecom Sudparis)
 A few of popular understanding:
• Bug Tracking - the process of reporting and tracking the progress of
bugs from discovery through to resolution. (source: “A study concerning
the bug tracking applications “ – Journal – Prof. Dr. Christian Bac –
Telecom Sudparis)
• Bug Tracking System - a software application that is designed to help
quality assurance and programmers keep track of reported software
bugs in their work (source: http://www.bugzilla.org/docs/)
 What is a “Bug Tracking” ?
CONFIDENTIAL
4 of 14
Introduction:
• Lesson Learned
Base on team experiences from a real project on PMU Automotive Division during after mid year 2012,
below the following fact were found by team on the last project:
• Found limitations “to gather bugs” and “to assign resources” for fixing them, because PM had to
wait ”to make sure” the item of issue
• Found difficulties “to manage bug report” (Reproduce/ simplify/ generalize/ analyze)
• Found difficulties “to track back of bugs history”
• Bug Communication
“Bug Tracking” is not only to keep track of issue or problem to reports and
maintain feature requests (if any changes) , but also to coordinate work
among developers team, management & customers
 General Consideration Regarding “Bug Tracking”
CONFIDENTIAL
5 of 14
Bug Tracking Tool:
 Anatomy of Bug (Best Practice)
CONFIDENTIAL
6 of 14
Bug Tracking Tool: (Cont…)
Bug TrackingBug Tracking
New bugs and enhancements
are submitted by Testing
Team
New bugs and enhancements
are submitted by Testing
Team
Team leaders set priority to
each new issues and assign
specific programmer
Team leaders set priority to
each new issues and assign
specific programmer
Programmers fix issues that
have been assigned to them
Programmers fix issues that
have been assigned to them
System analyst releases a
new internal version with the
new features and fixed issues
System analyst releases a
new internal version with the
new features and fixed issues
The testing team checks
whether all issues that have
been marked as fixed
The testing team checks
whether all issues that have
been marked as fixed
The testing team including QA
team closes the fixed issues
The testing team including QA
team closes the fixed issues
Bug
Tracking
Tool
Bug
Tracking
Tool
11
22
33
44
55
66
 Lifecycle of Bug (Best Practice)
CONFIDENTIAL
7 of 14
Bug Tracking Tool: (Cont…)
“If you’re going to write software of any size, you're going to have a few bugs along the way, and you’ll
need to keep track of them somehow. If you’re going to track your bugs, you may as well do it right. ” –
(source: http://www.bugtracker.com/bug-tracking-guide-best-practices)
Here are some benefit to use Bug Tracking:
•Increase visibility of development process
•Traceability of bugs and their resolutions
•Release planning
•Resource scheduling
•Prioritization
•Improved control of a project
•Information consolidation
•Improve the quality of your software by increasing productivity
•Raise customer satisfaction
 Benefit of Bug Tracking Tool
CONFIDENTIAL
8 of 14
Bug Tracking Tool: (Cont…)
• Designing workflow or framework
An workflow is a diagram that describes the states of the bug or defect from it is created to it is closed.
The first issue deals with the question: How workflow to design with standard framework?
 Common Issues of Bug Tracking Tool
StartStart
OpenOpen In ProgressIn Progress
ReopenedReopenedFixedFixed
Create issue
Issue fixed
Reopen issue
Issue fixed
Start progress
Start progress
Reopen issue
Verified issue
EndEnd
CONFIDENTIAL
9 of 14
Bug Tracking Tool: (Cont…)
• Meaning Fields
The second issue deals with the following questions:
• Which component does this bug fit in ?
• What does a "critical" priority mean ?
• etc. (undefined)
Also, there must be provided descriptions of each component, and a default owner for each component
• One Bug Many Releases
A very important characteristic of a bug tracking is the methods used
in order to track the same bug in different releases
 Common Issues of Bug Tracking Tool
Release 1.0
Release 2.0
Release 2.1
Bug Found Bug Fixed
CONFIDENTIAL
10 of 14
Bug Tracking Tool: (Cont…)
• Trusting History
Many interesting pieces of project information are time-based. For example:
• The minimum time necessary to find a bug
• The time necessary to fix a bug
• The estimative number of bugs delivered with a specific release
 Common Issues of Bug Tracking Tool
CONFIDENTIAL
11 of 14
Bug Tracking Tool: (Cont…)
• Choosing Bug Tracking Tool
• E-mail notifications
• File attachments
• History Trail
• Full Customization
• Powerful Reports
• Submitting issues
• Internet Based
• Integrated with other resources
• Multiple platform needs?
• Cost (tool cost / license ..)?
• Using Bug Tracking Tool
• What happen
• What the tester thinks should happen instead
• Steps to reproduces the problem
• How to improve Bug Communication
• How to ensure accountability
• How to automation & precise reports
 What should you look for in bug tracking tool?
CONFIDENTIAL
12 of 14
Bug Tracking Tool: (Cont…)
• Open source software
• Bugzilla
• Ozibug
• Flyspray
• BugTracker.Net
• BugNet
• WebIssues
• Trac
• BugGenie
• Eventum
• Mantis
• GNATS
• Redmine
• Scarab
• PhpBugTracker
• Project Open
• Etc.
 The Most Popular of Bug Tracking Systems (BTS)
• Commercial Software
• Inflectra
• FogBugz
• BugTracker
• BugTrack
• Zoho BugTracker
• Etc.
CONFIDENTIAL
13 of 14
Comment & Opinion:
“The most important info that
reporter can provide is a way to
reliably reproduce the issue”
“The most important info that
reporter can provide is a way to
reliably reproduce the issue”
“The most annoying problem is
too brief bug description”
“The most annoying problem is
too brief bug description”
“Incomplete information is the
biggest problem …”
“Incomplete information is the
biggest problem …”
“Using Bug Report template for
bug Description would be
helpful, I think”
“Using Bug Report template for
bug Description would be
helpful, I think”
Bug tracking is a fundamental part of the Software Engineering
lifecycle process. Effective use of a bug tracking system will lead to a
more structured approach throughout the development lifecycle,
resulting in a higher quality product while also reducing development
and support costs.
Bug Tracking
CONFIDENTIAL
14
Thank for Listening!
Questions and war stories about your own bug
tracking experiences are welcome…

More Related Content

What's hot

SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important QuestionsRagu M
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote VendorsObserveIT
 
Software Requirement Specification Master Template
Software Requirement Specification Master TemplateSoftware Requirement Specification Master Template
Software Requirement Specification Master TemplateWayne Chen
 
Password Management Before User Provisioning
Password Management Before User ProvisioningPassword Management Before User Provisioning
Password Management Before User ProvisioningHitachi ID Systems, Inc.
 
Cs itools06 csia_reporting_features_v10
Cs itools06 csia_reporting_features_v10Cs itools06 csia_reporting_features_v10
Cs itools06 csia_reporting_features_v10HermansJohan
 
Overview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerOverview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerDigicomp Academy AG
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
GCA Technology Healthcare Identity Management Case Study
GCA Technology Healthcare Identity Management Case StudyGCA Technology Healthcare Identity Management Case Study
GCA Technology Healthcare Identity Management Case StudyNetIQ
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Flexera
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java projectTutorial Learners
 
SRS Document for Digital Time Stamping
SRS Document for Digital Time StampingSRS Document for Digital Time Stamping
SRS Document for Digital Time Stampinglord
 
Srs example webapp
Srs example webappSrs example webapp
Srs example webappVineeth E
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRCAnil Kumar
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
Critical Analysis of SW Development tool/methodology
Critical Analysis of SW Development tool/methodologyCritical Analysis of SW Development tool/methodology
Critical Analysis of SW Development tool/methodologyDavid O' Connor
 

What's hot (20)

SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important Questions
 
Installation
InstallationInstallation
Installation
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
 
Software Requirement Specification Master Template
Software Requirement Specification Master TemplateSoftware Requirement Specification Master Template
Software Requirement Specification Master Template
 
Abac and the evolution of access control
Abac and the evolution of access controlAbac and the evolution of access control
Abac and the evolution of access control
 
Password Management Before User Provisioning
Password Management Before User ProvisioningPassword Management Before User Provisioning
Password Management Before User Provisioning
 
Cs itools06 csia_reporting_features_v10
Cs itools06 csia_reporting_features_v10Cs itools06 csia_reporting_features_v10
Cs itools06 csia_reporting_features_v10
 
Overview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerOverview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration Manager
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
GCA Technology Healthcare Identity Management Case Study
GCA Technology Healthcare Identity Management Case StudyGCA Technology Healthcare Identity Management Case Study
GCA Technology Healthcare Identity Management Case Study
 
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java project
 
SRS Document for Digital Time Stamping
SRS Document for Digital Time StampingSRS Document for Digital Time Stamping
SRS Document for Digital Time Stamping
 
Srs example webapp
Srs example webappSrs example webapp
Srs example webapp
 
scom
scomscom
scom
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Critical Analysis of SW Development tool/methodology
Critical Analysis of SW Development tool/methodologyCritical Analysis of SW Development tool/methodology
Critical Analysis of SW Development tool/methodology
 
Cua setup procedure SAP security
Cua setup procedure SAP securityCua setup procedure SAP security
Cua setup procedure SAP security
 

Similar to Discussion Paper: Bugs Tracking

LIST OF TOP BUG TRACKING TOOLS AND WHY ARE THEY CALLED SO
LIST OF TOP BUG TRACKING TOOLS AND WHY ARE THEY CALLED SOLIST OF TOP BUG TRACKING TOOLS AND WHY ARE THEY CALLED SO
LIST OF TOP BUG TRACKING TOOLS AND WHY ARE THEY CALLED SOVivek Bhardwaj
 
Object oriented sad 6
Object oriented sad 6Object oriented sad 6
Object oriented sad 6Bisrat Girma
 
Effective Bug Tracking Systems: Theories and Implementation
Effective Bug Tracking Systems: Theories and ImplementationEffective Bug Tracking Systems: Theories and Implementation
Effective Bug Tracking Systems: Theories and ImplementationIOSR Journals
 
Programming Fundamentals lecture 3
Programming Fundamentals lecture 3Programming Fundamentals lecture 3
Programming Fundamentals lecture 3REHAN IJAZ
 
Feb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition DevelopmentFeb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition DevelopmentBarb Tillich
 
Creating An Incremental Architecture For Your System
Creating An Incremental Architecture For Your SystemCreating An Incremental Architecture For Your System
Creating An Incremental Architecture For Your SystemGiovanni Asproni
 
Fundamentals of Testing
Fundamentals of TestingFundamentals of Testing
Fundamentals of TestingCode95
 
Three Interviews About Static Code Analyzers
Three Interviews About Static Code AnalyzersThree Interviews About Static Code Analyzers
Three Interviews About Static Code AnalyzersAndrey Karpov
 
Web Application Security And Getting Into Bug Bounties
Web Application Security And Getting Into Bug BountiesWeb Application Security And Getting Into Bug Bounties
Web Application Security And Getting Into Bug Bountieskunwaratul hax0r
 
U test whitepaper_10
U test whitepaper_10U test whitepaper_10
U test whitepaper_10eshwar83
 
A year of SonarQube and TFS/VSTS
A year of SonarQube and TFS/VSTSA year of SonarQube and TFS/VSTS
A year of SonarQube and TFS/VSTSMatteo Emili
 
Using HPC Resources to Exploit Big Data for Code Review Analytics
Using HPC Resources to Exploit Big Data for Code Review AnalyticsUsing HPC Resources to Exploit Big Data for Code Review Analytics
Using HPC Resources to Exploit Big Data for Code Review AnalyticsThe University of Adelaide
 
Dk tracker presentation
Dk tracker presentationDk tracker presentation
Dk tracker presentationDenaya Dennis
 
Why Don't Software Developers Use Static Analysis Tools to Find Bugs?
Why Don't Software Developers Use Static Analysis Tools to Find Bugs?Why Don't Software Developers Use Static Analysis Tools to Find Bugs?
Why Don't Software Developers Use Static Analysis Tools to Find Bugs?PVS-Studio
 
Modern Software Testing Techniques: A Practical Guide for Developers and Testers
Modern Software Testing Techniques: A Practical Guide for Developers and TestersModern Software Testing Techniques: A Practical Guide for Developers and Testers
Modern Software Testing Techniques: A Practical Guide for Developers and TestersLucky Gods
 
179 black-box-software-testing-copyright-2003-cem-kaner1652
179 black-box-software-testing-copyright-2003-cem-kaner1652179 black-box-software-testing-copyright-2003-cem-kaner1652
179 black-box-software-testing-copyright-2003-cem-kaner1652ngothanhtungth
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestMatt Tesauro
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in softwareIAEME Publication
 

Similar to Discussion Paper: Bugs Tracking (20)

LIST OF TOP BUG TRACKING TOOLS AND WHY ARE THEY CALLED SO
LIST OF TOP BUG TRACKING TOOLS AND WHY ARE THEY CALLED SOLIST OF TOP BUG TRACKING TOOLS AND WHY ARE THEY CALLED SO
LIST OF TOP BUG TRACKING TOOLS AND WHY ARE THEY CALLED SO
 
Object oriented sad 6
Object oriented sad 6Object oriented sad 6
Object oriented sad 6
 
Bug Advocacy
Bug AdvocacyBug Advocacy
Bug Advocacy
 
Effective Bug Tracking Systems: Theories and Implementation
Effective Bug Tracking Systems: Theories and ImplementationEffective Bug Tracking Systems: Theories and Implementation
Effective Bug Tracking Systems: Theories and Implementation
 
Programming Fundamentals lecture 3
Programming Fundamentals lecture 3Programming Fundamentals lecture 3
Programming Fundamentals lecture 3
 
Feb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition DevelopmentFeb 2013Lesson 38 Software Acquisition Development
Feb 2013Lesson 38 Software Acquisition Development
 
Creating An Incremental Architecture For Your System
Creating An Incremental Architecture For Your SystemCreating An Incremental Architecture For Your System
Creating An Incremental Architecture For Your System
 
Fundamentals of Testing
Fundamentals of TestingFundamentals of Testing
Fundamentals of Testing
 
Bug Tracking Java Project
Bug Tracking Java ProjectBug Tracking Java Project
Bug Tracking Java Project
 
Three Interviews About Static Code Analyzers
Three Interviews About Static Code AnalyzersThree Interviews About Static Code Analyzers
Three Interviews About Static Code Analyzers
 
Web Application Security And Getting Into Bug Bounties
Web Application Security And Getting Into Bug BountiesWeb Application Security And Getting Into Bug Bounties
Web Application Security And Getting Into Bug Bounties
 
U test whitepaper_10
U test whitepaper_10U test whitepaper_10
U test whitepaper_10
 
A year of SonarQube and TFS/VSTS
A year of SonarQube and TFS/VSTSA year of SonarQube and TFS/VSTS
A year of SonarQube and TFS/VSTS
 
Using HPC Resources to Exploit Big Data for Code Review Analytics
Using HPC Resources to Exploit Big Data for Code Review AnalyticsUsing HPC Resources to Exploit Big Data for Code Review Analytics
Using HPC Resources to Exploit Big Data for Code Review Analytics
 
Dk tracker presentation
Dk tracker presentationDk tracker presentation
Dk tracker presentation
 
Why Don't Software Developers Use Static Analysis Tools to Find Bugs?
Why Don't Software Developers Use Static Analysis Tools to Find Bugs?Why Don't Software Developers Use Static Analysis Tools to Find Bugs?
Why Don't Software Developers Use Static Analysis Tools to Find Bugs?
 
Modern Software Testing Techniques: A Practical Guide for Developers and Testers
Modern Software Testing Techniques: A Practical Guide for Developers and TestersModern Software Testing Techniques: A Practical Guide for Developers and Testers
Modern Software Testing Techniques: A Practical Guide for Developers and Testers
 
179 black-box-software-testing-copyright-2003-cem-kaner1652
179 black-box-software-testing-copyright-2003-cem-kaner1652179 black-box-software-testing-copyright-2003-cem-kaner1652
179 black-box-software-testing-copyright-2003-cem-kaner1652
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in software
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Discussion Paper: Bugs Tracking

  • 1. CONFIDENTIAL Discussion Paper of :Discussion Paper of : Bug TrackingBug Tracking Prep.By : Deny PrasetiaPrep.By : Deny Prasetia January 12th 2013, Rev.00. PT. Berlian Sistem Informasi
  • 2. CONFIDENTIAL 2 of 14 Outline: • Introduction • What is a Bug? • What is a Bug Tracking? • Consideration Regarding Bug Tracking • Bug Tracking Tool • Anatomy of Bug • Lifecycle of Bug • Benefit of Bug Tracking Tool • Common Issues of Bug Tracking Tool • What Should You Look For In Bug Tracking Tool • The Most Popular of Bug Tracking Systems (BTS) • Comment & Opinion I will explain about ….
  • 3. CONFIDENTIAL 3 of 14 Introduction:  What is a "Bug” (read: “Computer/ Software Bug”) ?  Wikipedia offers a good literature: • A computer bug is any problem with a computer, whether caused by software or hardware. (source: http://en.wikipedia.org/wiki/Computer_bug) • Bug (software bug) - an error, flaw, mistake, "undocumented feature", failure, or fault in a computer program that prevents it from behaving as intended (e.g., producing an incorrect result). (source: “A study concerning the bug tracking applications “ – Journal – Prof. Dr. Christian Bac – Telecom Sudparis)  A few of popular understanding: • Bug Tracking - the process of reporting and tracking the progress of bugs from discovery through to resolution. (source: “A study concerning the bug tracking applications “ – Journal – Prof. Dr. Christian Bac – Telecom Sudparis) • Bug Tracking System - a software application that is designed to help quality assurance and programmers keep track of reported software bugs in their work (source: http://www.bugzilla.org/docs/)  What is a “Bug Tracking” ?
  • 4. CONFIDENTIAL 4 of 14 Introduction: • Lesson Learned Base on team experiences from a real project on PMU Automotive Division during after mid year 2012, below the following fact were found by team on the last project: • Found limitations “to gather bugs” and “to assign resources” for fixing them, because PM had to wait ”to make sure” the item of issue • Found difficulties “to manage bug report” (Reproduce/ simplify/ generalize/ analyze) • Found difficulties “to track back of bugs history” • Bug Communication “Bug Tracking” is not only to keep track of issue or problem to reports and maintain feature requests (if any changes) , but also to coordinate work among developers team, management & customers  General Consideration Regarding “Bug Tracking”
  • 5. CONFIDENTIAL 5 of 14 Bug Tracking Tool:  Anatomy of Bug (Best Practice)
  • 6. CONFIDENTIAL 6 of 14 Bug Tracking Tool: (Cont…) Bug TrackingBug Tracking New bugs and enhancements are submitted by Testing Team New bugs and enhancements are submitted by Testing Team Team leaders set priority to each new issues and assign specific programmer Team leaders set priority to each new issues and assign specific programmer Programmers fix issues that have been assigned to them Programmers fix issues that have been assigned to them System analyst releases a new internal version with the new features and fixed issues System analyst releases a new internal version with the new features and fixed issues The testing team checks whether all issues that have been marked as fixed The testing team checks whether all issues that have been marked as fixed The testing team including QA team closes the fixed issues The testing team including QA team closes the fixed issues Bug Tracking Tool Bug Tracking Tool 11 22 33 44 55 66  Lifecycle of Bug (Best Practice)
  • 7. CONFIDENTIAL 7 of 14 Bug Tracking Tool: (Cont…) “If you’re going to write software of any size, you're going to have a few bugs along the way, and you’ll need to keep track of them somehow. If you’re going to track your bugs, you may as well do it right. ” – (source: http://www.bugtracker.com/bug-tracking-guide-best-practices) Here are some benefit to use Bug Tracking: •Increase visibility of development process •Traceability of bugs and their resolutions •Release planning •Resource scheduling •Prioritization •Improved control of a project •Information consolidation •Improve the quality of your software by increasing productivity •Raise customer satisfaction  Benefit of Bug Tracking Tool
  • 8. CONFIDENTIAL 8 of 14 Bug Tracking Tool: (Cont…) • Designing workflow or framework An workflow is a diagram that describes the states of the bug or defect from it is created to it is closed. The first issue deals with the question: How workflow to design with standard framework?  Common Issues of Bug Tracking Tool StartStart OpenOpen In ProgressIn Progress ReopenedReopenedFixedFixed Create issue Issue fixed Reopen issue Issue fixed Start progress Start progress Reopen issue Verified issue EndEnd
  • 9. CONFIDENTIAL 9 of 14 Bug Tracking Tool: (Cont…) • Meaning Fields The second issue deals with the following questions: • Which component does this bug fit in ? • What does a "critical" priority mean ? • etc. (undefined) Also, there must be provided descriptions of each component, and a default owner for each component • One Bug Many Releases A very important characteristic of a bug tracking is the methods used in order to track the same bug in different releases  Common Issues of Bug Tracking Tool Release 1.0 Release 2.0 Release 2.1 Bug Found Bug Fixed
  • 10. CONFIDENTIAL 10 of 14 Bug Tracking Tool: (Cont…) • Trusting History Many interesting pieces of project information are time-based. For example: • The minimum time necessary to find a bug • The time necessary to fix a bug • The estimative number of bugs delivered with a specific release  Common Issues of Bug Tracking Tool
  • 11. CONFIDENTIAL 11 of 14 Bug Tracking Tool: (Cont…) • Choosing Bug Tracking Tool • E-mail notifications • File attachments • History Trail • Full Customization • Powerful Reports • Submitting issues • Internet Based • Integrated with other resources • Multiple platform needs? • Cost (tool cost / license ..)? • Using Bug Tracking Tool • What happen • What the tester thinks should happen instead • Steps to reproduces the problem • How to improve Bug Communication • How to ensure accountability • How to automation & precise reports  What should you look for in bug tracking tool?
  • 12. CONFIDENTIAL 12 of 14 Bug Tracking Tool: (Cont…) • Open source software • Bugzilla • Ozibug • Flyspray • BugTracker.Net • BugNet • WebIssues • Trac • BugGenie • Eventum • Mantis • GNATS • Redmine • Scarab • PhpBugTracker • Project Open • Etc.  The Most Popular of Bug Tracking Systems (BTS) • Commercial Software • Inflectra • FogBugz • BugTracker • BugTrack • Zoho BugTracker • Etc.
  • 13. CONFIDENTIAL 13 of 14 Comment & Opinion: “The most important info that reporter can provide is a way to reliably reproduce the issue” “The most important info that reporter can provide is a way to reliably reproduce the issue” “The most annoying problem is too brief bug description” “The most annoying problem is too brief bug description” “Incomplete information is the biggest problem …” “Incomplete information is the biggest problem …” “Using Bug Report template for bug Description would be helpful, I think” “Using Bug Report template for bug Description would be helpful, I think” Bug tracking is a fundamental part of the Software Engineering lifecycle process. Effective use of a bug tracking system will lead to a more structured approach throughout the development lifecycle, resulting in a higher quality product while also reducing development and support costs. Bug Tracking
  • 14. CONFIDENTIAL 14 Thank for Listening! Questions and war stories about your own bug tracking experiences are welcome…