The document discusses the role of a tester on an agile project. It introduces the speaker's experience with agile testing since 2000. The topics to be covered include learning about the audience members, a brief introduction to agile, the challenges of agile testing, what agile testing is, the life of a tester during an iteration, how testing must keep up with rapid changes, and continual improvement. The goal is to help testers understand their important role within the agile process.
Testing Techniques For Agile Testers - Janet GregoryAGILEMinds
This document discusses techniques for agile testers. It covers test planning at the product, release, and iteration levels. Collaboration and communication are emphasized. The Agile Testing Quadrants framework is introduced for classifying different types of tests based on purpose. Test-driven development (TDD) benefits and quadrant one testing are described, focusing on technology-facing tests that support developers. Automation, test strategy planning, and the testing toolkit are also mentioned.
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
This document introduces a fun way to search for people or things on Google by adding "is" after the name or
thing in quotation marks. Some examples given are searching "Zhang San is" which
Women are projected to make up the majority of the US labor force for the first time in history. This will have significant economic impacts as women increasingly control household spending and incomes. Small community banks are gaining market share by marketing themselves as more trustworthy alternatives to the large banks that received government bailouts. Tax rebate checks are expected to provide a short-term boost to the economy, with women and young adults planning to spend the largest portions of their checks.
Newspaper websites have huge audiences, often 10-20 times larger than their print circulation numbers. However, they are not generating as much ad revenue as expected given these large audiences. The problem seems to be that despite newspapers having millions of unique visitors per month, they have not been able to fully monetize this traffic through advertising.
The document discusses cloud computing and its benefits. It notes that cloud computing allows for access to computing resources from anywhere using an internet connection. Some key benefits mentioned are flexibility, cost savings from not having to maintain physical infrastructure, and scalability to add or remove resources as needed.
The document contains discussions between two individuals, Chang.wangc@alibaba-inc.com and an unknown recipient, about setting up an FX exchange. It includes screenshots of an FX trading platform interface and market share statistics for major internet companies in China.
Testing Techniques For Agile Testers - Janet GregoryAGILEMinds
This document discusses techniques for agile testers. It covers test planning at the product, release, and iteration levels. Collaboration and communication are emphasized. The Agile Testing Quadrants framework is introduced for classifying different types of tests based on purpose. Test-driven development (TDD) benefits and quadrant one testing are described, focusing on technology-facing tests that support developers. Automation, test strategy planning, and the testing toolkit are also mentioned.
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
This document introduces a fun way to search for people or things on Google by adding "is" after the name or
thing in quotation marks. Some examples given are searching "Zhang San is" which
Women are projected to make up the majority of the US labor force for the first time in history. This will have significant economic impacts as women increasingly control household spending and incomes. Small community banks are gaining market share by marketing themselves as more trustworthy alternatives to the large banks that received government bailouts. Tax rebate checks are expected to provide a short-term boost to the economy, with women and young adults planning to spend the largest portions of their checks.
Newspaper websites have huge audiences, often 10-20 times larger than their print circulation numbers. However, they are not generating as much ad revenue as expected given these large audiences. The problem seems to be that despite newspapers having millions of unique visitors per month, they have not been able to fully monetize this traffic through advertising.
The document discusses cloud computing and its benefits. It notes that cloud computing allows for access to computing resources from anywhere using an internet connection. Some key benefits mentioned are flexibility, cost savings from not having to maintain physical infrastructure, and scalability to add or remove resources as needed.
The document contains discussions between two individuals, Chang.wangc@alibaba-inc.com and an unknown recipient, about setting up an FX exchange. It includes screenshots of an FX trading platform interface and market share statistics for major internet companies in China.
The document describes different methods of communication over the internet including email, chat, voice over IP (VoIP), and video conferencing. E-mail can be used for communication between individuals or groups. Chat options include MSN Messenger. Voice calls can be placed over the internet using VoIP technology instead of traditional phone lines. Video conferencing allows for face-to-face communication online through programs and webcams.
This document discusses the definition of Islamic architecture and whether it can be considered a unique style. It questions whether Islamic architecture refers only to religious buildings like mosques, or all architecture from Muslim lands. It explores how the term "Islamic" is being used and whether there is a recognizable style that differs from non-Islamic cultures. The document suggests identifying typical elements in Islamic architecture that express a culture shaped by Islam in a way that differs from other traditions.
This document contains a summary of the table of contents for a physics textbook divided into two volumes. Volume 1 is divided into 5 parts covering topics such as measurement, motion, force, energy, momentum, rotation, oscillations, waves, thermodynamics, and kinetic theory of gases. Volume 2 is divided into 5 additional parts covering electromagnetism, images, interference, diffraction, and relativity, as well as additional topics in modern physics.
This document discusses personal branding and provides steps to build a personal brand. It defines personal brand as a set of perceptions formed by others based on their experiences with an individual. It then lists the key elements of personal brand as passion, commitment, focus and patience. Finally, it outlines a 7 step process to establish a personal brand, which includes conducting a brand audit, assessing your image, determining your identity and positioning your brand.
This document contains a summary of a report presented at a conference on mobile technologies, business, and prospects. The summary is divided into five sections:
1. An introduction to mobile learning (M-learning), which involves the use of mobile devices for educational purposes.
2. Sections 2-4 discuss additional aspects of M-learning.
3. Section 5 draws conclusions about M-learning.
The document discusses employer branding and recruitment touchpoints. It defines employer branding as focusing on initiatives to enhance a company's perception among current employees and external stakeholders. It emphasizes that employer branding requires a long-term, coordinated strategy to attract, retain and motivate talent. The document outlines key aspects of building an employer brand like defining objectives, ensuring brand relevancy and storytelling through multiple communication channels. It also maps out common recruitment touchpoints that shape a candidate's experience.
The document discusses personal brand. It begins by asking the reader what they think about brand and personal brand. It then states that many people think personal brand is only important for celebrities, officials, businesspeople or public figures. However, personal brand is important for everyone as it represents their uniqueness and qualities to others. Developing a personal brand allows anyone to market themselves effectively.
The document appears to be a series of images showing the logo "F-X Change" in different formats and languages. There are several variations of the logo presented side by side and in some cases additional text is included but it is difficult to read. The overall content seems to be promoting the brand "F-X Change" but specific details about the company or its services are not provided in the summary-length text.
The document appears to be a list of names that have sent blessings to "His Majesty". It includes over 30 Thai names written in English letters, as well as short messages or notes from some of the names.
This document describes several C programs that print "Hello, world" or print Fahrenheit to Celsius temperature conversion tables. It includes the following C programs:
1. A simple "Hello, world" program using printf.
2. A program that uses a for loop to print a Fahrenheit to Celsius table from 0 to 300 degrees Fahrenheit in 20 degree increments.
3. A program that uses a while loop and getchar/putchar functions to copy input characters to output until end-of-file is reached.
The document discusses a presentation given by Carolyn Jenkins on the future of simulation for healthcare education. The presentation explored how simulation will be interconnected with technology, pedagogy, people, society, and culture. A power point from the presentation is available online. The document also provides references cited in the presentation.
The document discusses the evolution of the internet and social media:
1. It describes the transition from static Web 1.0 to dynamic Web 2.0 with user-generated content and social networking features.
2. It outlines the rise of social networking services (SNS) like blogs, social bookmarking, media sharing sites, and microblogging platforms.
3. It provides examples of different types of social media including social networks, content communities, social gaming, chat, and discussion forums.
1. The document discusses various types of computer crimes and computer criminals, ranging from novice hackers to organized crime rings.
2. Key cases of computer hacking and crimes are outlined, including the Morris worm of 1988, the hacking of Yahoo in 1997, and the hacking of Tsutomu Shimomura by Kevin Mitnick in 1995.
3. Computer crime statistics are presented, with estimates of annual losses ranging from $40-400 billion or more.
1. The document discusses various types of computer crime and hackers/crackers, including novice hackers, organized crime groups, hackers for ideological reasons, and con artists.
2. Examples are provided of early computer crimes in the 1980s involving worms and unauthorized access to systems.
3. Statistics are presented on the increasing costs of computer crime to businesses and individuals over the years, now in the billions of dollars.
1. The document discusses various types of computer crime and computer criminals, ranging from novice hackers to organized crime rings.
2. Examples of specific computer crimes are discussed, such as the Morris worm of 1988, hacks on Yahoo and AOL, and the theft of trade secrets from companies by hackers like Kevin Mitnick.
3. Statistics are presented on the large financial losses caused by computer crimes, such as billions lost annually to online theft and fraud.
This document provides information on developmental counseling in the military. It discusses the purpose of counseling to develop subordinates and help them achieve goals. It describes the different types of counseling including event, performance, and professional growth counseling. The document provides guidance on how to conduct counseling including identifying the need, preparing, conducting, and following up. It also gives examples of adverse counseling and terms used in counseling.
This document provides specifications for locating pins with diameters ranging from 6mm to 19mm. It includes dimensions for the pins like radii, depth, and tolerances. Charts list National Aerospace and Defense Contractors Accreditation Program (NAAMS) codes, dimensions, and weights for each pin size. Pins are made of SAE 8620 steel and hardened to 58-62 Rockwell C.
This document provides floor plans and details for the Castleton home design. The 3 bedroom, 2.5 bathroom home has a total square footage of 4,151 square feet with 2,521 square feet on the main level and 1,630 square feet on the second level. The front elevation drawing and plan features are also included.
The document discusses the problem of monetizing news media websites. While news sites report huge audience numbers in unique visitors per month, often much higher than their print circulation, they fail to generate comparable advertising revenue to print. This is because the metrics of unique visitors and time spent are poor measures of a site's actual audience. Upon closer examination, people spend very little time on news sites, less than 1.5 minutes per day on average. In contrast, print newspapers still engage over 40 million French readers spending 28 minutes daily, generating 20 times the audience of online news. This disparity explains why news websites struggle to monetize their "eyeballs" effectively.
The document discusses social networking sites (SNS) and microblogging. It mentions Weibo, an important Chinese microblogging platform, and notes the years 2011 and SACC2011, possibly referring to a conference. The repetitive structure discusses transmission of information on SNS and microblogging platforms.
This document is a forwarded email thread discussing a Croatian journalist. It contains the original message criticizing the journalist for having a mother who was a communist, as well as subsequent forwards of that message between various parties for sharing. The document criticizes the journalist and calls for there to be "one less idiot in Croatia".
The document describes different methods of communication over the internet including email, chat, voice over IP (VoIP), and video conferencing. E-mail can be used for communication between individuals or groups. Chat options include MSN Messenger. Voice calls can be placed over the internet using VoIP technology instead of traditional phone lines. Video conferencing allows for face-to-face communication online through programs and webcams.
This document discusses the definition of Islamic architecture and whether it can be considered a unique style. It questions whether Islamic architecture refers only to religious buildings like mosques, or all architecture from Muslim lands. It explores how the term "Islamic" is being used and whether there is a recognizable style that differs from non-Islamic cultures. The document suggests identifying typical elements in Islamic architecture that express a culture shaped by Islam in a way that differs from other traditions.
This document contains a summary of the table of contents for a physics textbook divided into two volumes. Volume 1 is divided into 5 parts covering topics such as measurement, motion, force, energy, momentum, rotation, oscillations, waves, thermodynamics, and kinetic theory of gases. Volume 2 is divided into 5 additional parts covering electromagnetism, images, interference, diffraction, and relativity, as well as additional topics in modern physics.
This document discusses personal branding and provides steps to build a personal brand. It defines personal brand as a set of perceptions formed by others based on their experiences with an individual. It then lists the key elements of personal brand as passion, commitment, focus and patience. Finally, it outlines a 7 step process to establish a personal brand, which includes conducting a brand audit, assessing your image, determining your identity and positioning your brand.
This document contains a summary of a report presented at a conference on mobile technologies, business, and prospects. The summary is divided into five sections:
1. An introduction to mobile learning (M-learning), which involves the use of mobile devices for educational purposes.
2. Sections 2-4 discuss additional aspects of M-learning.
3. Section 5 draws conclusions about M-learning.
The document discusses employer branding and recruitment touchpoints. It defines employer branding as focusing on initiatives to enhance a company's perception among current employees and external stakeholders. It emphasizes that employer branding requires a long-term, coordinated strategy to attract, retain and motivate talent. The document outlines key aspects of building an employer brand like defining objectives, ensuring brand relevancy and storytelling through multiple communication channels. It also maps out common recruitment touchpoints that shape a candidate's experience.
The document discusses personal brand. It begins by asking the reader what they think about brand and personal brand. It then states that many people think personal brand is only important for celebrities, officials, businesspeople or public figures. However, personal brand is important for everyone as it represents their uniqueness and qualities to others. Developing a personal brand allows anyone to market themselves effectively.
The document appears to be a series of images showing the logo "F-X Change" in different formats and languages. There are several variations of the logo presented side by side and in some cases additional text is included but it is difficult to read. The overall content seems to be promoting the brand "F-X Change" but specific details about the company or its services are not provided in the summary-length text.
The document appears to be a list of names that have sent blessings to "His Majesty". It includes over 30 Thai names written in English letters, as well as short messages or notes from some of the names.
This document describes several C programs that print "Hello, world" or print Fahrenheit to Celsius temperature conversion tables. It includes the following C programs:
1. A simple "Hello, world" program using printf.
2. A program that uses a for loop to print a Fahrenheit to Celsius table from 0 to 300 degrees Fahrenheit in 20 degree increments.
3. A program that uses a while loop and getchar/putchar functions to copy input characters to output until end-of-file is reached.
The document discusses a presentation given by Carolyn Jenkins on the future of simulation for healthcare education. The presentation explored how simulation will be interconnected with technology, pedagogy, people, society, and culture. A power point from the presentation is available online. The document also provides references cited in the presentation.
The document discusses the evolution of the internet and social media:
1. It describes the transition from static Web 1.0 to dynamic Web 2.0 with user-generated content and social networking features.
2. It outlines the rise of social networking services (SNS) like blogs, social bookmarking, media sharing sites, and microblogging platforms.
3. It provides examples of different types of social media including social networks, content communities, social gaming, chat, and discussion forums.
1. The document discusses various types of computer crimes and computer criminals, ranging from novice hackers to organized crime rings.
2. Key cases of computer hacking and crimes are outlined, including the Morris worm of 1988, the hacking of Yahoo in 1997, and the hacking of Tsutomu Shimomura by Kevin Mitnick in 1995.
3. Computer crime statistics are presented, with estimates of annual losses ranging from $40-400 billion or more.
1. The document discusses various types of computer crime and hackers/crackers, including novice hackers, organized crime groups, hackers for ideological reasons, and con artists.
2. Examples are provided of early computer crimes in the 1980s involving worms and unauthorized access to systems.
3. Statistics are presented on the increasing costs of computer crime to businesses and individuals over the years, now in the billions of dollars.
1. The document discusses various types of computer crime and computer criminals, ranging from novice hackers to organized crime rings.
2. Examples of specific computer crimes are discussed, such as the Morris worm of 1988, hacks on Yahoo and AOL, and the theft of trade secrets from companies by hackers like Kevin Mitnick.
3. Statistics are presented on the large financial losses caused by computer crimes, such as billions lost annually to online theft and fraud.
This document provides information on developmental counseling in the military. It discusses the purpose of counseling to develop subordinates and help them achieve goals. It describes the different types of counseling including event, performance, and professional growth counseling. The document provides guidance on how to conduct counseling including identifying the need, preparing, conducting, and following up. It also gives examples of adverse counseling and terms used in counseling.
This document provides specifications for locating pins with diameters ranging from 6mm to 19mm. It includes dimensions for the pins like radii, depth, and tolerances. Charts list National Aerospace and Defense Contractors Accreditation Program (NAAMS) codes, dimensions, and weights for each pin size. Pins are made of SAE 8620 steel and hardened to 58-62 Rockwell C.
This document provides floor plans and details for the Castleton home design. The 3 bedroom, 2.5 bathroom home has a total square footage of 4,151 square feet with 2,521 square feet on the main level and 1,630 square feet on the second level. The front elevation drawing and plan features are also included.
The document discusses the problem of monetizing news media websites. While news sites report huge audience numbers in unique visitors per month, often much higher than their print circulation, they fail to generate comparable advertising revenue to print. This is because the metrics of unique visitors and time spent are poor measures of a site's actual audience. Upon closer examination, people spend very little time on news sites, less than 1.5 minutes per day on average. In contrast, print newspapers still engage over 40 million French readers spending 28 minutes daily, generating 20 times the audience of online news. This disparity explains why news websites struggle to monetize their "eyeballs" effectively.
The document discusses social networking sites (SNS) and microblogging. It mentions Weibo, an important Chinese microblogging platform, and notes the years 2011 and SACC2011, possibly referring to a conference. The repetitive structure discusses transmission of information on SNS and microblogging platforms.
This document is a forwarded email thread discussing a Croatian journalist. It contains the original message criticizing the journalist for having a mother who was a communist, as well as subsequent forwards of that message between various parties for sharing. The document criticizes the journalist and calls for there to be "one less idiot in Croatia".
The document discusses several models of organizational culture:
1) The F-X Change model presents culture as shared assumptions that guide behavior and are taken for granted.
2) The Denison model views culture as deep structure of organizations involving shared values, beliefs, and behaviors.
3) Edgar Schein's model proposes that culture consists of observable artifacts, espoused values, and deep basic underlying assumptions.
Media Plaza Presentatie Businessclub Velperbroek 16 08 2008Media Plaza
The document appears to be a technical diagram showing the process of an F-X change involving photo development (PD). It shows information being received and then processed through different stages represented by boxes connected by arrows before an outcome is produced. The overall flow and purpose of the process is unclear from the limited visual information provided.
The document appears to be a presentation discussing Naver's mobile app platform and strategy. It provides statistics on daily active users and revenues over several periods. It also discusses Naver's goals of aligning its social network services with mobile and outlines its plans to support developers and grow its mobile app business from 2011 through early 2012.
This document discusses computer crime. It begins with an encrypted header and footer on each page. The document then lists numbered sections that likely correspond to different types or cases of computer crimes.
1. The document discusses various types of computer crimes and computer criminals, ranging from novice hackers to organized crime rings.
2. Key cases of computer hacking and crimes are outlined, including the Morris worm of 1988, the "141 Hackers" movie from 1983, and Kevin Mitnick's high-profile hacking incidents.
3. Computer crime statistics are presented on the costs of attacks, number of victims, and average financial losses.
Similar to A Testers Role On Agile Projects - Janet Gregory (11)
Lean Startup - Customer Development - Aarrr metricsAGILEMinds
The document provides guidance on improving fishing skills and business metrics. It discusses acquiring customers, activating them through clear messaging and helping them, retaining customers through quality and experience, gaining referrals through word of mouth and easy sharing, and earning revenue. Key metrics mentioned include the viral coefficient, lifetime value, cohorts, and A/B testing. The document emphasizes the importance of collaborating with customers, focusing on the right metrics, validating learning through experiments, and using the AARRR framework to build a strategic narrative.
This document discusses scheduling work using Kanban rather than Scrum at a Finnish telecom company developing a self-service channel for corporate customers. It had previously used Scrum for 3 years and transitioned to Kanban for the past 9 months. Key aspects of Kanban discussed include not having estimations, sprints, fixed teams or domain areas. The document emphasizes collaboration, transparency and pessimism as keys to success with Kanban scheduling.
Patrick steyaert lean adaptive management - achieving complex business goal...AGILEMinds
The document discusses lean and adaptive management approaches. It describes different types of projects including enhancements, extensions, emergent projects, and sensitive projects. Each project type has different risk profiles and challenges. Adaptive management is presented as an approach that recognizes every project is unique but some are more unique than others, requiring tailored approaches.
This document discusses the difference between options and commitments in IT risk management using real options theory. It explores when something is optional versus a commitment and how having more options allows for greater flexibility and survivability when times to recover are greater than times that can be survived. The presentation includes various images and quotes to illustrate key points about valuing options, allowing options to expire, never committing early without understanding why, and how real liquidity is determined by the time between investment commitment and realizing benefits. In the end, it encourages attendees to create more options and prepare to move quickly while having fun.
The document discusses various concepts related to agile development and startups. It provides examples of Groupon's business model and the challenges of entrepreneurship. Key points covered include:
- Agile development and how it may help build better products.
- The elements needed for a successful business like customers, value proposition, costs, marketing etc.
- Groupon's initial business model of deal of the day emails and how it acquired merchants and customers.
- That entrepreneurship involves hypothesizing customer problems and solutions, experimenting through MVPs, and being ready to pivot the business model based on learning.
- Different types of pivots like customer problem, segment, technology, revenue model etc
Mike burrows level demand, balance workload and manage schedule risk with c...AGILEMinds
The document discusses using classes of service to manage different types of work in a lean/Kanban system. It describes classifying work into standard, fixed date, expedited, and intangible categories based on their cost of delay profile. The document recommends reducing work in progress, making work items smaller, starting work at the right time, and borrowing from other work to create more flexibility. It also advocates embracing diversity by designing the system and policies around different expectations for each class of service.
Michael kennedy set-based decision making taming system complexityAGILEMinds
The document discusses challenges with traditional "phase-gate" product development approaches and describes an alternative set-based decision making approach used by Toyota. Specifically, it notes that phase-gate approaches often result in project delays and cost overruns due to decisions made early in development before critical knowledge is known. In contrast, Toyota focuses on developing knowledge through rapid cycles of learning and convergence across projects, delaying design decisions as long as possible and doing more validation testing upfront to learn before designing. This set-based approach manages knowledge growth into products through cadences of learning pulled into successive launches.
Mattias skarin what would you do - analysing chartsAGILEMinds
This document discusses using control charts and continuous flow charts to monitor and improve a development process. It provides examples of valid purposes for collecting data, such as validating theories, learning over time, and distinguishing between variance and trends. The document then presents a case study where a team is working on too many projects in parallel compared to their plan. Participants are asked to analyze a chart showing the status of work over sprints and determine what should be happening instead, such as limiting work in progress. Finally, the document discusses how charts combined with process knowledge can drive learning and improvement.
Matthias Bohlen is a coach and trainer for effective product development. He helps teams improve effectiveness through lean and Kanban methods. He has extensive experience developing software and coaching teams to improve processes, reduce waste, and increase productivity and employee satisfaction. Some key services he provides include helping teams build trust, improve communication, establish clear processes and scenarios to understand behaviors, and achieve flow in their work.
Mark robinson what does lean mean for software testingAGILEMinds
The document discusses eliminating waste from testing processes by making testing more lean. It identifies seven types of waste: partially done work, extra features, relearning, handoffs, task switching, delays, and defects. The document recommends value stream mapping to reduce delays, early tester involvement, shorter test cycles, and automation through techniques like test-driven development to make testing more efficient. Automating testing finds defects very quickly and enables developers to continuously mistake-proof their work.
The document discusses the science behind kanban and lean principles. It covers topics like complex vs. complicated systems, queuing theory, feedback loops, risk reduction, and the golden circle. Kanban focuses on limiting work in progress to improve flow while respecting people and processes. The goal is to build the right things in the right way and measure outcomes.
Jurgen de smet yves hanoulle real optionsAGILEMinds
The document discusses the concept of real options decision making, which advocates keeping options open for as long as possible by gathering information and only committing to decisions when necessary. It involves identifying available options and their associated conditions, timelines, and costs. The goal is to deal flexibly with risk and make decisions later when more information is available. Examples discussed include set-based design in engineering and dimensional planning to avoid expensive mistakes.
The document discusses the "Vanguard Method" which challenges conventional management thinking. It argues that management assumptions can lead to sub-optimization in organizations. The Vanguard Method takes a systems approach to understand an organization, revealing counterintuitive truths. Specifically, it finds that 95% of variation in worker performance is due to the system, not the workers themselves. It advocates measuring actual performance in customer terms to drive improvement.
Jasper sonnevelt pitfalls of a large kanban implementationAGILEMinds
Benelux Insurance Company piloted Kanban with some teams starting in August 2009 and saw positive results, but faced challenges expanding it rapidly to more teams by December 2010. Some pitfalls included expanding too quickly without proper training, not ensuring full multidisciplinary collaboration, and failing to understand that every team is different and changes take time to implement successfully. The conclusion emphasizes the need to involve management, provide education, understand team dynamics, and consciously scale implementations over time rather than expanding too rapidly.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This document discusses how teams can work together to achieve flow at a larger scale beyond single teams. It recommends that teams commit to a shared vision, define boundaries between teams through commitments, and optimize their work based on complexity, risk, and each team's capabilities rather than just the story flow. By aligning visions, outsourcing easy work, and having teams pull work per their strengths, organizations can achieve epic flow across multiple teams.
Don reinertsen is it time to rethink demingAGILEMinds
The document discusses rethinking some of W. Edwards Deming's ideas in the context of product development. It notes that while Deming's work was influential for repetitive manufacturing, his statistical process control ideas must be adapted when applied to other domains like product development. The document questions if organizations should respond to all variation, try to eliminate variability, and if problems are always best prevented rather than corrected. It suggests Deming's views assume independent and identically distributed outcomes but product development may involve dependent stochastic processes.
David joyce jalipo build it and they will comeAGILEMinds
Jalipo was founded in London as an online marketplace for TV and video content, allowing content owners to offer channels, video-on-demand, and live events directly to viewers worldwide using a unique pay-per-minute model. It gained £5M in funding and launched in 2007 with a variety of products and services. However, despite being innovative and technically advanced, Jalipo struggled to gain customers and ran out of funding, ultimately being acquired in 2008 as it failed to generate sufficient revenue from viewers.
David anderson kanban when is it not appropriateAGILEMinds
Kanban is an approach for managing work based on limiting work-in-progress to balance demand with available capacity. It is appropriate when a process suffers from overburdening or uneven flow due to factors like variability in skills, information delays, or capacity constraints. Kanban uses visualizing workflows, limiting WIP, managing flow, explicit process policies, and continuous improvement to evolve processes incrementally. While initially focused on software development, Kanban can be applied across domains as an overlay to control variability and eliminate overburdening in simple, complicated, and complex work.
Dave snowden practice without sound theory will not scaleAGILEMinds
This document discusses complexity theory and its application to organizational management. It argues that traditional systems thinking has limitations and a new approach is needed that is informed by complexity science and cognitive science. It presents key concepts from complexity theory like emergence and phase transitions. It also emphasizes the importance of narratives, rituals, and networks between groups.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 6
A Testers Role On Agile Projects - Janet Gregory
1. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
A Tester’s Role
on an
Agile Project
Agile Tester Days
Belgium
September, 2009
Janet Gregory, DragonFire Inc.
With material from Lisa Crispin
1
2. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Introduction - Me
First agile team – 2000
Currently – coaching, testing
Agile Testing: A Practical Guide for Testers
and Agile Teams; Addison Wesley 2009
2
Copyright 2009: Janet Gregory, DragonFire
3. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Topics
What about you !!!!
A very little bit about agile
Challenges
What is agile testing
Life of a tester during an iteration
Why and how testing must “keep up”
Continual improvement
3
Copyright 2009: Janet Gregory, DragonFire
4. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Agile is a term to describe methodologies that:
have short iterations
encourage active customer participation
demand whole team collaboration
test features as they are coded
deliver business value at regular intervals
adapt their processes based on feedback
…and so on………….
5. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Blurred Lines Between Roles
Agile developers are “test infected”
Agile testers and programmers collaborate
Agile testers and customers collaborate
“Whole Team” responsibility for testing
Everyone understands the business
5
5
Copyright 2009: Janet Gregory, DragonFire
6. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
What challenges do you see for
agile testers?
6
Copyright 2009: Janet Gregory, DragonFire
7. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Exercise
Break into groups
Discuss your current project or previous
projects
What type of problems is your team
experiencing?
Choose the top 3 problems you would like
to solve
7
Copyright 2009 Lisa Crispin and Janet Gregory
8. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Some Common Challenges
Separate test team
No common language
Fear – loss of identity
Testing always at the end
Organizational culture
Don’t know enough about agile concepts
Lack technical and tool skills
Physical limitations – work space
8
Copyright 2009: Janet Gregory, DragonFire
9. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
What is Agile Testing?
Testers are part of the team
Drives development with tests
Work with customers to define acceptance
tests for each story / feature
Provides continuous feedback to the team
Provides constructive skepticism
Tests each story as it is complete
9
Copyright 2009: Janet Gregory, DragonFire
10. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Management Expectations
Phased approach… 90% done… until it’s too late
Agile – new expectations
Make quality the priority (not speed!)
Let the team solve problems
Give team time to learn / slack time
Tips / Techniques
Provide visibility – raise risks early
Stress adaptive rather than predictive
Stress ‘getting business value’ regularly
Build credibility / trust by proving it works
10
Copyright 2007: Lisa Crispin and Janet Gregory
11. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
The agile tester’s mindset .....
Instead of
– We’re here to break the software!
Think
– What can we do to help deliver
the software successfully?
11
12. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Be involved, question, be proactive
13. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Whole Team Approach
Anyone can pick up a testing task
Run automated regression tests
regularly
Continuous build
Minimally – daily!
Otherwise ……….
13
Copyright 2009: Janet Gregory, DragonFire
14. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Discuss ....
Instead of saying NO,
or being the gatekeeper
Be the information provider so
business can make the decisions
14
Copyright 2009: Janet Gregory, DragonFire
15. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Change how we think about testing …
Focus on the 'why' we test
Change the way we think
not about the when
not about the how
white box, black box
15
Copyright 2009 Janet Gregory, DragonFire
16. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
The Agile Testing Quadrants
Brian Marick introduced the concept
Can be used to ensure we accomplish all goals
Q1 - Technology-facing tests that support the team
Q2 - Business-facing tests that support the team
Q3 - Business-facing tests that critique the product
Q4 - Technology-facing tests that critique the product
16
Copyright 2009 Janet Gregory, DragonFire
17. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Test Approach - The Agile Way
Project Initiation Get an understanding of the project
Release Planning Participate in estimating stories Create Test Plan
Each Iteration Write and execute story tests
1 Write and execute new functional test cases
…. Pair test with other testers, developers
X Automate new functional test cases
Run automated regression test cases
Perform Load Test
System Test / Complete Regression Test
End Game Perform UAT
Perform Mock Deploy
Participate in Release Readiness
Release to Prod/
Support Participate in Release to Prod
Participate in Retrospectives 17
Copyright 2008 Janet Gregory, DragonFire
18. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Project Initiation
Purpose – high level understanding of project
Questions to ask:
Are other teams involved?
Will we need special resources?
Test environments, tools, people
What other risks are there?
May be asked for 10,000 ft estimates
Required to determine cost/benefit
18
Copyright 2008 Janet Gregory, DragonFire
19. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Release Planning – The Purpose
Understand the “Conditions of Satisfaction”
Criteria to gauge success of the project
Functionality, quality, time???
Want to get a good idea of relative ‘size’
Plan what might be possible
19
Copyright 2008 Janet Gregory, DragonFire
20. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
What do you think a tester’s role is
during release planning ....
If anything?
20
Copyright 2009: Janet Gregory, DragonFire
21. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Release Planning – Tester’s Role
Sizing of stories
think about impacts to system
Ask questions
that may impact the ‘bigness’ of the story
to uncover hidden assumptions
such as ‘what if?’, or “what happens if?”
Not the time for details
Create a project “test plan”
21
Copyright 2008 Janet Gregory, DragonFire
22. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Preparing for Iteration - Stories
Be proactive - preplanning
Specifications workshops – Gojko Adzic
Help customer achieve ‘advance clarity’
on stories
Customers speak with “one voice”
Testable stories
Steel threads
22
Copyright 2009: Janet Gregory, DragonFire
23. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Use Pictures to Clarify
23
Copyright 2009: Janet Gregory, DragonFire
24. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Learning to Collaborate
Groups again....
Step 1 – Draw your vision of the perfect ....
Step 2 – Collaborate to create one common
vision that each of you can live with.
24
Copyright 2009 Lisa Crispin and Janet Gregory
25. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
During Iteration Planning
• Find hidden assumptions – question assumptions
• Ask “why?” Ask “what if?”
• Define and estimate testing tasks
• Ask what other tasks are required
• Define high level story tests or examples
25
Copyright 2009: Janet Gregory, DragonFire
26. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Testable Stories
Goal – steel thread, thin slice, critical path
Work towards an end-to-end first cut
What is absolutely required
Keep it simple
Allows whole team to work together
Gives good basis for testing
Later – add complexity / extras
26
Copyright 2008 Janet Gregory, DragonFire
27. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Drive Development - ATDD
ATDD (Acceptance Test Driven Development)
Express the intent of the story
Use examples
Defines behaviours
Maybe misbehaviours
Help the developers to understand what is
expected
27
Copyright 2008 Janet Gregory, DragonFire
28. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Acceptance Test Exercise
The story…..
As an on-line shopper, I want to provide my
shipping address when I check out so that my
order goes to the right location.
Consider
Locations – countries?
Misbehaviours?
What is the simplest thing we could do?
28
Copyright 2008 Janet Gregory, DragonFire
29. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
When Coding Starts
Write detailed test cases from examples
Make them executable if possible
Write simple, happy path tests to automate
Share them with the programmers
Once simple tests pass, write more test cases
Start with happy path
Then move towards edge cases
Identify possible exploratory scenarios
29
Copyright 2009: Janet Gregory, DragonFire
30. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Testing/Coding: Don’t sit and wait!
Is any testable part of a story ready?
Test with behind-the-GUI tool such as FIT?
Or other harness to bypass GUI
Pair with programmers
Test together before check-in
Show them issues
Ask questions
Bugs found here are cheap and easy to fix
30
Copyright 2009: Janet Gregory, DragonFire
31. F -X C h a n ge F -X C h a n ge
PD PD
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Testing/Coding: Collaboration
Pair with customers
Show customer early
Does delivered feature meet expectation?
Other team members, e.g.
Work with DBA to understand database
Work with sys admin to get better messaging
from continual build
31
Copyright 2009: Janet Gregory, DragonFire