In this quality assurance training session, you will learn Other Testing Types. Topics covered in this course are:
• Testing the code – WBT
• Database Testing
• UI Testing
• Non Functionality Testiing
• Class Assignment
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn defects and its categories. Topics covered in this course are:
• Defects / Bug and few Scenarios
• Reason for defects
• Defect template
• Defect Life Cycle
• Defect report & Defect Tracking tools
• Class Assignment
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this session you will learn:
Defect Life Cycle
Defect States
Defect Content
Severity Vs Priority
Severity Levels
For more information: https://www.mindsmapped.com/courses/quality-assurance/qa-software-testing-training-for-beginners/
In this quality assurance training, you will learn Defect Life Cycle. Topics covered in this session are:
• Defect Life Cycle
• Defect States
• Defect Content
• Severity Vs Priority
• Severity Levels
For more information, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-training-beginners-and-intermediate-level/
In this session you will learn:
Types of Testing
Start and Stop of Testing
For more information: https://www.mindsmapped.com/courses/quality-assurance/qa-software-testing-training-for-beginners/
This presentation throws light on some of the essential elements of web testing which have become crucial to ensure quality in this day and age. To know more on web testing, Graphical User Interface Testing, workflow testing along with Cross Browser or Compatibility testing, go through this presentation as well as the ones coming soon.
In this quality assurance training session, you will learn defects and its categories. Topics covered in this course are:
• Defects / Bug and few Scenarios
• Reason for defects
• Defect template
• Defect Life Cycle
• Defect report & Defect Tracking tools
• Class Assignment
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this session you will learn:
Defect Life Cycle
Defect States
Defect Content
Severity Vs Priority
Severity Levels
For more information: https://www.mindsmapped.com/courses/quality-assurance/qa-software-testing-training-for-beginners/
In this quality assurance training, you will learn Defect Life Cycle. Topics covered in this session are:
• Defect Life Cycle
• Defect States
• Defect Content
• Severity Vs Priority
• Severity Levels
For more information, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-training-beginners-and-intermediate-level/
In this session you will learn:
Types of Testing
Start and Stop of Testing
For more information: https://www.mindsmapped.com/courses/quality-assurance/qa-software-testing-training-for-beginners/
This presentation throws light on some of the essential elements of web testing which have become crucial to ensure quality in this day and age. To know more on web testing, Graphical User Interface Testing, workflow testing along with Cross Browser or Compatibility testing, go through this presentation as well as the ones coming soon.
In this Quality Assurance Training session, you will learn about Testing Concepts and Manual Testing. Topic covered in this session are:
• Overview of Testing Life Cycle
• Testing Methodologies
• Static Testing
• Dynamic Testing
• Black Box Testing
• White Box Testing
• Gray Box Testing
• Levels of Testing
• Unit Testing
• Component Testing
• Integration Testing
• System/ Functional Testing
• Regression Testing
• UAT (User Acceptance Testing)
• Various Types of Testing
• Start And Stop Software Testing
• Class Assignment
For more information, about this quality assurance training, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-training-with-hands-on-project-on-e-commerce-application/
9.5+ years of IT professional experience in telecom domain.
Working on Agile Methodology.
Worked on OSS/BSS applications. Experience in ordering domain.
Good knowledge in Order Management Syetem.
Posses B1 Visa which is valid till July 2022.
Travelled to US on B1 for 3 months.
Attained good experience in Functional, Integration, Regression testing.
Good knowledge in web service testing. Have tools tools like SOAP UI, POSTMAN.
Hands on experience on Tool like Toad ,BUSTESTER.
Attained good experience in writing Test Cases / Scenarios / Automating using QTP.
3 years experience in Automation ( QTP ) in developing framework & writing scripts.
Have automated 2 web based application and 1 desktop application using QTP/UFT and VB script.
Load Testing Best Practices: Application complexity is increasing, yet the stringent requirements for web performance is increasing exponentially. Learn more about the three major types of load testing, determine which you need and how to conduct them.
Introduction
Mobile Trends
Mobile Evolution
Top Ten Trends
Mobile Ecosystem
Smartphone Trends
Mobile Application Testing
Application Option
Approach to QA
Challenges
Implementation
In this Quality Assurance Training session, you will learn about Testing Concepts and Manual Testing. Topic covered in this session are:
• Overview of Testing Life Cycle
• Testing Methodologies
• Static Testing
• Dynamic Testing
• Black Box Testing
• White Box Testing
• Gray Box Testing
• Levels of Testing
• Unit Testing
• Component Testing
• Integration Testing
• System/ Functional Testing
• Regression Testing
• UAT (User Acceptance Testing)
• Various Types of Testing
• Start And Stop Software Testing
• Class Assignment
For more information, about this quality assurance training, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-training-with-hands-on-project-on-e-commerce-application/
9.5+ years of IT professional experience in telecom domain.
Working on Agile Methodology.
Worked on OSS/BSS applications. Experience in ordering domain.
Good knowledge in Order Management Syetem.
Posses B1 Visa which is valid till July 2022.
Travelled to US on B1 for 3 months.
Attained good experience in Functional, Integration, Regression testing.
Good knowledge in web service testing. Have tools tools like SOAP UI, POSTMAN.
Hands on experience on Tool like Toad ,BUSTESTER.
Attained good experience in writing Test Cases / Scenarios / Automating using QTP.
3 years experience in Automation ( QTP ) in developing framework & writing scripts.
Have automated 2 web based application and 1 desktop application using QTP/UFT and VB script.
Load Testing Best Practices: Application complexity is increasing, yet the stringent requirements for web performance is increasing exponentially. Learn more about the three major types of load testing, determine which you need and how to conduct them.
Introduction
Mobile Trends
Mobile Evolution
Top Ten Trends
Mobile Ecosystem
Smartphone Trends
Mobile Application Testing
Application Option
Approach to QA
Challenges
Implementation
In this presentation which was delivered to testers in Manchester, I help would-be performance testers to get started in performance testing. Drawing on my experiences as a performance tester and test manager, I explain the principles of performance testing and highlight some of the pitfalls.
In this Business Analysis training session, you will learn about Role of BA in Testing. Topics covered in this session are:
• Software Quality Testing
• Purpose of Quality Testing
• Project Life Cycle and Software Testing
• Quality Testing in Different Phases of Project Life Cycle
• Role of a Software Tester
• Types of Software Testing
• Software Testing Types Explained
• Various Software Testing Tools
• Verification and Validation
• Role of Business Analyst
• Purpose of Business Analysis and a Business Analyst Role
• Business Analyst Effects the Change
• Business Analyst’s role in different phases of Project life cycle - PLC
For more information, click here: https://www.mindsmapped.com/courses/business-analysis/become-a-business-analyst-with-hands-on-practice/
In this business analysis training session, you will learn about BA in Testing. Topics covered in this course are:
• Software Quality Testing
• Purpose of Quality Testing
• Project Life Cycle and Software Testing
• Quality Testing in Different Phases of Project Life Cycle
• Role of a Software Tester
• Types of Software Testing
• Software Testing Types Explained
• Various Software Testing Tools
• Verification and Validation
• Role of Business Analyst
• Purpose of Business Analysis and a Business Analyst Role
• Business Analyst Effects the Change
• Business Analyst’s role in different phases of the Project life cycle - PLC
To know more, visit this link: https://www.mindsmapped.com/courses/business-analysis/become-a-business-analyst-hands-on-practice-with-real-life-templates/
In this business analysis training session, you will learn about Role of BA in Testing. Topics covered in this course are:
• Software Quality Testing
• Purpose of Quality Testing
• Project Life Cycle and Software Testing
• Quality Testing in Different Phases of Project Life Cycle
• Role of a Software Tester
• Types of Software Testing
• Software Testing Types Explained
• Various Software Testing Tools
• Verification and Validation
• Role of Business Analyst
• Purpose of Business Analysis and a Business Analyst Role
• Business Analyst Effects the Change
• Business Analyst’s role in different phases of Project life cycle - PLC
To know more, visit this link: https://www.mindsmapped.com/courses/business-analysis/become-a-business-analyst-hands-on-practice-with-real-life-templates/
In this business analysis training, you will learn Role of BA in Testing. Topics covered in this session are:
• Software Quality Testing
• Purpose of Quality Testing
• Project Life Cycle and Software Testing
• Quality Testing in Different Phases of Project Life Cycle
• Role of a Software Tester
• Types of Software Testing
• Software Testing Types Explained
• Various Software Testing Tools
• Verification and Validation
• Role of Business Analyst
• Purpose of Business Analysis and a Business Analyst Role
• Business Analyst Effects the Change
• Business Analyst’s role in different phases of Project life cycle - PLC
For more information, visit this link: https://www.mindsmapped.com/courses/business-analysis/business-analyst-training-for-beginners/
it is based on the introduction of performance testing and its modules and the process which include performance testing and it consist of name of software or tools which are used to check the performance of any software.
In this Business Analysis Training session, you will learn, Solution Evaluation (BA Role) . Topics covered in this session are:
• Software Quality Testing
• Purpose of Quality Testing
• Project Life Cycle and Software Testing
• Quality Testing in Different Phases of Project Life Cycle
• Role of a Software Tester
• Types of Software Testing
• Software Testing Types Explained
• Various Software Testing Tools
• Verification and Validation
• Role of Business Analyst
• Purpose of Business Analysis and a Business Analyst Role
• Business Analyst Effects the Change
• Business Analyst’s role in different phases of the Project life cycle - PLC
To learn more about this course, visit this link: https://www.mindsmapped.com/courses/business-analysis/foundation-level-business-analyst-training/
This presentation includes:
- Why performance matters for digital businesses?
- Use Cases for performance / load testing
- Load Test Design Considerations
- Tools and Technologies
- Methodology and Approach
- Activities and Deliverables
- Load Testing Success Stories
Black-Box Testing, Model-Based Testing, Testing for Specialized Environments, Architecture, Object-Oriented Testing Strategies, Object-Oriented Testing Methods, Test Cases and the Class Hierarchy, Testing Concepts for WebApps, Testing Process – An Overview, User Interface Testing, Test Plan, Positive Testing Negative Testing
In this quality assurance training session, you will learn HP ALM. Topics covered in this course are:
• ALM – What is ALM? Why use ALM? Architecture of ALM.
• ALM – Workflow
• Test Execution and its cycles
• Testing Methodology (BBT , WBT)
• Class Assignment
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn JIRA. Topics covered in this course are:
• What is JIRA?
• JIRA Scheme
• JIRA Issues & Types
• Issue Types
• JIRA Components
• Priority
• Jira Workflow
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn Selenium WebDriver. Topics covered in this course are:
• Selenium Components
• Introduction to Web Driver
• Downloading and Configuring Web Driver with Eclipse
• Web Driver Methods
• Web Driver Locators
• Interacting with different UI elements
• Synchronization, Alert and multiple window
• Dynamic Menus
• Cookie Management
• Launching different web browsers
• Introduction to Test NG
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn Core Java for Selenium. Topics covered in this course are:
• Java Fundamentals
• Introduction to Java
• Programming Language fundamentals
• Key Java Concepts
• Strings and collections
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn QTP/UFT automation testing. Topics covered in this course are:
• Introduction to QTP
• Features of QTP
• Recording modes of QTP
• Object Repository
• Synchronization point
• Step Generator
• Object Spy
• Checkpoints
• Data-driven testing & Parameterization
• Working with actions
• Reporting in QTP
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn introduction to software testing. Topics covered in this course are:
• Course Overview
• Introduction to Software Testing
• Is Testing a Technical role
• Project And Product
• Quality Assurance Vs Quality Control
• QC VS QA
• Verification and Validation
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn Test Execution. Topics covered in this course are:
• Test Execution and its purpose
• Entry and Exit Criteria
• Test Execution and its cycles
• Testing Methodology (BBT , WBT)
• Class Assignment
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
3. Page 3Classification: Restricted
Contents:
• Testing the code and database
- White Box testing techniques
- Database testing
• Testing the user interface
- UI testing
- Usability testing
- Accessibility testing
- Localization testing
• Non functional system level testing
- Performance testing (Load , Stress, Endurance, Volume)
- Installation testing
- Configuration testing
- Compatibility testing
- Security testing
4. Page 4Classification: Restricted
White Box Testing (WBT)
• WBT is a method of testing Application’s internal structure i.e Program
code
• Number of test cases are dependent on code complexity
[More the execution paths, more are the test cases to ensure code coverage]
• Also called structural /glass box testing
• Test design phase begins once coding is done
• Metrics to measure the code coverage in white box testing are
1. Statement coverage - % statements executed by test cases
2. Decision coverage - % decisions(Yes and No both) executed by test
cases
3. Condition coverage - % of conditions (True and false both) executed
by test cases
5. Page 5Classification: Restricted
White Box Testing (WBT)
Sample code: #Statements= 2
If (a>b || a>c) #Decisions = 1
Printf(“Number a”); #Conditions = 2
Coverage of Test case 1
a=5,b=4,c=2
Test case 2
a=1,b=3,c=2
Test case 3
a=3,b=4,c=2
Statement 1 Yes Yes Yes
Statement 2 Yes No Yes
Decision Yes(Result –
true)
Yes(Result -
False)
Yes(Result –
true)
Condition 1 Yes(Result –
true)
Yes(Result -
False)
Yes(Result -
False)
Condition 2 No Yes(Result -
False)
Yes(Result –
true)
6. Page 6Classification: Restricted
White Box Testing (WBT)
It can be seen that
• Only TC1 is sufficient for 100% statement coverage
• TC1 and TC2 are needed for 100% decision coverage
• TC1, TC2, TC3 are needed for 100% condition coverage
www.mindsmapped.com
7. Page 7Classification: Restricted
Advantage of White Box Testing (WBT)
• Easy to determine which input data ranges to be used to test the
application effectively
• Logical mistakes in the code can be located quickly
• It helps in removing the extra lines of code, which can bring in hidden
defects
www.mindsmapped.com
8. Page 8Classification: Restricted
Challenges and Limitations of White Box Testing (WBT)
Challenges
• To cover all possible paths and decision is difficult in complex applications
• The tester needs to have knowledge of code and internal architecture of
application
Limitations
• Will never test requirements which are not implemented / coded
• Large number of test cases might be needed to test even in case of small
code/ implementation changes
9. Page 9Classification: Restricted
Database Testing
• Database
- To organize, store and retrieve large amounts of data
- Storage at central location, easier multi-access
- Commonly used databases – RDBMS (Relational database Management
Systems)
- Data is stored in tables in the form of rows and columns
- SQL is used to perform database operations
www.mindsmapped.com
10. Page 10Classification: Restricted
Database Testing
• Deals with finding defects in the database component of the application
• Testing includes checking of
- Data type and size validity
- Data Integrity test
- Stored Procedures
- Triggers
• Examples
- Adding data that does not fit the constraint [adding name more than 40
characters where column has character constraint of 40]
- Checking “On Update” trigger firing by updating data in database
- Testing of stored procedures to check the output and error handling
11. Page 11Classification: Restricted
UI Testing
• UI comprises of controls like textbox, text area, radio button, drop down,
checkboxes etc
• UI testing determines how user friendly the application is from look and
feel perspective
12. Page 12Classification: Restricted
User Interface (UI) Testing
• Checklist for UI testing included
- Checking of UI design template from consistency and appropriateness
perspective – font size, background and foreground colour schemes,
frames, header, footer
- Checking tab sequence
- Placement of controls i.e Alignment and Positioning
- Consistent look of some control throughout application
- Screen resizing option
• Example where UI is a key
- Applications interfacing with medical equipments displaying critical
information and graphs
- Advertising and shopping websites
- Search Engines
13. Page 13Classification: Restricted
Usability Testing
• Done to check ease of use of an application
• To determine how simple it is to understand and use application without
anyone’s help
• Checklist for usability testing includes:
- Is the user getting guided within the application?
- Is proper error message and adequate help provided to the user on
incorrect steps?
- Do new users understand the application usage quickly?
- Is quick access provided to frequently used features?
Examples for Usability
- For a web site, is navigation within the web pages provided and is there a
home page and logout link on every page
- Check for use of correct icons and corresponding tool tips
- Check for dropdown values being sorted correctly
14. Page 14Classification: Restricted
Accessibility Testing
• Objective is to check that the application is usable by people with
disabilities
- Physical disability
Able to operate using only one hand , not able to see mouse or
keyboard
- Vision disability
Poor vision, colour blindness, blindness
- Hearing disability
Not able to hear clearly or can not hear at all
15. Page 15Classification: Restricted
Localization Testing
• Globalization is a process of application design so that it can be adapted to
different languages and regions without any change in the program and
code
• Localization is the process of adapting a globalized application to a
particular culture / locale. It includes translation of the Application’s UI &
graphics for a specific culture /locale
• Localization testing includes checking of
- Language translation and statement length fitment
- Date format localization – European style: DD/MM/YY
- Text direction – right to left or left to right
- Language of text in graphics, messages
- Addressing cultural aspects in screen design and language used
16. Page 16Classification: Restricted
What is non Functional Testing
• Testing of “how well application as a whole behaves” when it is exposed to
real life working conditions
• Based on the non – functional requirements specified in the requirements
documents
• Conducted after system’s functionality is tested , during system testing
• Non functional testing includes: Performance, installation, configuration,
compatibility, security
17. Page 17Classification: Restricted
Performance Testing
• Performance testing checks whether application provides stipulated output
in stipulated time
• Carried out after functional testing
• Performance requirements of application include
- Response time – How fast request is processed / served.
Example: Time taken for search feature
- Throughput – Number of transactions processed by an application per
unit of time.
Example: Number of telephone bills processed by billing application in an
hour
- Types – Load, Stress, Endurance, Volume
- Tools – Load Runner, Rational Performance tester, Silk performer,
OpenSTA
18. Page 18Classification: Restricted
Load Testing
• A load test is conducted to understand the behaviour of the system under a
specific expected load
• Load means number of multiple users accessing the application
concurrently, mentioned in the SRS
• Example, online shopping application will be used by thousand users at a
time. These user load can further be divided into different tasks like
- 600 users log in, browse and then log off
- 250 users log in, add items to cart, check out log off
- 150 users just log in without any subsequent activity
• Load testing includes
- Creates users virtually using tools to perform above actions
- Check the response time
19. Page 19Classification: Restricted
Endurance Testing
• Determine whether system can sustain to a continuous expected load for a
longer duration
• Predefined load is applied for a longer period of time
• Example to check on-line shopping application flooded with 1000 users
throughout the day
20. Page 20Classification: Restricted
Stress Testing
• To evaluate the ability of an application to maintain a certain level of
effectiveness under unfavourable conditions
• Unfavourable conditions include
- overload the existing resources with excess jobs
- Load is applied beyond the specified limits
Example,
- Increase no of virtual users beyond the prescribed load
- Running several resource-intensive applications in a single computer at the
same time like flooding a server with useless e-mail messages
21. Page 21Classification: Restricted
Volume Testing
• Refers to testing an application with a huge amount of data and check its
limitations
• Tests are conducted once database is expanded to required size
• Determine whether limits are acceptable to meet the organizations
projected business processing
• This type of testing is needed mainly for transactions processing systems
capturing real time sales etc
• Applications performance during database updates or data retrieval is
checked with volume of data
22. Page 22Classification: Restricted
Installation Testing
• Verify that all the necessary components of the application are getting
installed correctly
• Identifies different ways in which installation procedure may cause errors
• Needs proper documented installation procedure
• Tests include
- Checking successful installation of application as per installation
procedure
- How installer reacts when pre-requisites of hardware, software are not
met
- Checking all available installation types for eg typical, custom, complete
etc
- Are all the files installed in the respective folder?
- Checking uninstallation or midway cancellation of installation process
• Smoke testing can be conducted after installation to confirm correct
installation
23. Page 23Classification: Restricted
Configuration Testing
• When an application is developed, it is designed to work for a particular
configuration
• Configuration testing is done to assess applications behaviour and
performance on the range of hardware and software configurations for
which it is designed
• It may include different hardware, processors, operating system,
peripherals
24. Page 24Classification: Restricted
Compatibility Testing
• Test application for the configurations for which it is not designed and
check its compatibility
• Testing will include checking application on
- Different platforms
- Database
• Cross browser compatibility testing
- Web applications are always tested on different famous browsers as
users may use any
- Checking is done for functioning of special controls and UI
Tools: Browsershots, Browsera, Browsercam
25. Page 25Classification: Restricted
Security Testing
• Determines that an application protects data and maintains functionality
access as intended
- Protection against intrusion / hacking / data leakage
• Necessary for applications having critical information handling or govt sites
or military organizations, financial sites, brand conscious industries
• If Application is not secured , it leads to
- Loss of creditability with customers, business, reputation
- Unauthorized access to sensitive information
- Regulatory non – compliance
• Tools : IBM Rational AppScan, HP Web Inspect, Web Scarab
26. Page 26Classification: Restricted
Types of applications and testing types
Desktop –
single or
limited
users
Desktop –
product for
large
number of
users
Client -
Server
Web
Installation @ @@@ @@ @
UI @ @@ @@ @@@
Usability @ @@ @@ @@@
Accessibility
/ Localization
- @@ @ @@
Configuratio
n
@ @@ @@ @@
Compatibility - @@@ @ @@@
Performance - @ @@ @@@
Security - @ @@ @@@
27. Page 27Classification: Restricted
RISK MANAGEMENT
• Risk management is an important part of planning for businesses. The
process of risk management is designed to reduce or eliminate the risk of
certain kinds of events happening or having an impact on the business.
28. Page 28Classification: Restricted
Continued….
• Risk management is a process for identifying, assessing, and prioritizing
risks of different kinds. Once the risks are identified, the risk manager will
create a plan to minimize or eliminate the impact of negative events. A
variety of strategies is available, depending on the type of risk and the type
of business. There are a number of risk management standards, including
those developed by the Project Management Institute, the International
Organization for Standardization (ISO), the National Institute of Science and
Technology, and actuarial societies.
29. Page 29Classification: Restricted
Risk Risk
type
Description
Staff
turnover
Project Experienced staff will leave the
project before it is finished.
Management
change
Project There will be a change of
organizational management with
different priorities.
Hardware
unavailability
Project Hardware which is essential for the project
will not be delivered on schedule.
Requirements
change
Project &
Product
There will be a larger number of
changes to the requirements than
anticipated.
30. Page 30Classification: Restricted
Risk Risk type Description
Specification delays Project &
Product
Specifications of essential interfaces are
not available on schedule.
Size under estimate Project &
Product
The size of the system has been under
estimated.
CASE tool under
performance
Product CASE tools which support the project do
not perform as anticipated.
Technology change Business The underlying technology on which the
system is built is superseded by new
technology.
Product competition Business A competitive product is marketed before
the system is completed.
32. Page 32Classification: Restricted
Project Management
• Management involve activities and tasks undertaken by one or more
persons for the purpose of planning, coordinating and controlling activities
of other in order to achieve objectives that could not be achieved by other
acting alone.
• The activities that are involved in management are called as management
functions.
33. Page 33Classification: Restricted
Continued….
• The people who are responsible for these efforts performs the functions.
• Project management is a system of management procedure practices,
technology, skill and experience that are necessary to manage a project.
34. Page 34Classification: Restricted
Continued…
• And a s/w project management is the important activity of planning,
organizing, directing, motivating and coordinating a group of professionals
to a complain software development it is the responsibility of the project
manager to implement the activities with life cycle approach selected for
the project.
36. Page 36Classification: Restricted
Project Staffing
• Project Staffing includes gathering the resources for the project in different
hierarchy levels.
• The staff should include various levels of resources with the expertise level
to balance the team.
37. Page 37Classification: Restricted
• Project budget may not allow to utilize
highly – paid staff.
• Staff with the appropriate experience may not be available.
38. Page 38Classification: Restricted
Project Planning
Plan Description
Quality plan Describes the quality procedures and
standards used in a project.
Validation plan Describes the approach, resources and
schedule used for system validation.
Configuration
management plan
Describes the configuration management
procedures and structures to be used.
Maintenance plan Predicts the maintenance requirements of the
system/ maintenance costs and efforts
required.
Staff
development plan
Describes how the skills and experience of
the project team members will be developed.
40. Page 40Classification: Restricted
What is Quality?
• Quality is “fitness for use” - (Joseph Juran)
• Quality is “conformance to requirements” - (Philip B. Crosby)
• Quality of a product or service is its ability to satisfy the needs
and expectations of the customer
42. Page 42Classification: Restricted
Deming’s Learning Cycle of Quality
“Inspection with the aim of finding the bad ones and throwing them out is
too late, ineffective and costly.
Quality comes not from inspection but improvement of the process.”
Dr. W. Edwards Deming Founder of the Quality Evolution
43. Page 43Classification: Restricted
QUALITY PRINCIPLES
Quality - the most important factor affecting an organization’s long-term
performance.
Quality - the way to achieve improved productivity and competitiveness in
any organization.
Quality - saves. It does not cost.
Quality - is the solution to the problem, not a problem.
44. Page 44Classification: Restricted
SEI – CMM
• Software Engineering Institute (SEI) developed Capability Maturity
Model (CMM)
• CMM describes the prime elements - planning, engineering, managing
software development and maintenance
• CMM can be used for
• Software process improvement
• Software process assessment
• Software capability evaluations
45. Page 45Classification: Restricted
• A maturity level is a well-defined evolutionary plan toward achieving a
mature software process. Each maturity level provides a layer in the
foundation for continuous process improvement.
• In CMM models with a staged representation, there are five maturity levels
designated by the numbers 1 through 5
• Initial
• Managed
• Defined
• Quantitatively Managed
• Optimizing