SlideShare a Scribd company logo
Using Diversity for Automated Boundary
Value Testing
Felix Dobslaw
#TestVikings
Crest open Workshop (CoW) 2019
2/77
Boundary Value Analysis/Testing
3/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
4/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
5/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
6/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
What are program boundaries?
7/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
What are program boundaries?
Take 1: where behavior is supposed to change (specification centric)
8/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
What are program boundaries?
Take 1: where behavior is supposed to change (specification centric)
Take 2: where behavior changes (function centric)
9/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
What are program boundaries?
Take 1: where behavior is supposed to change (specification centric)
Take 2: where behavior changes (function centric)
Tackle Take 1: Explicit specification, check edge cases. Requires manual work.
10/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
What are program boundaries?
Take 1: where behavior is supposed to change (specification centric)
Take 2: where behavior changes (function centric)
Tackle Take 1: Explicit specification, check edge cases. Requires manual work.
Tackle Take 2: Explore program boundaries, extract actual edge cases. Can be automated.
11/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
What are program boundaries?
Take 1: where behavior is supposed to change (specification centric)
Take 2: where behavior changes (function centric)
Tackle Take 1: Explicit specification, check edge cases. Requires manual work.
Tackle Take 2: Explore program boundaries, extract actual edge cases. Can be automated.
BVA vs. BVT?
12/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
What are program boundaries?
Take 1: where behavior is supposed to change (specification centric)
Take 2: where behavior changes (function centric)
Tackle Take 1: Explicit specification, check edge cases. Requires manual work.
Can be used in combination.
Tackle Take 2: Explore program boundaries, extract actual edge cases. Can be automated.
BVA vs. BVT?
13/77
Boundary Value Analysis/Testing
Why? Find bugs, anomalies, deviation from intent
What are program boundaries?
Take 1: where behavior is supposed to change (specification centric)
Take 2: where behavior changes (function centric)
Tackle Take 1: Explicit specification, check edge cases. Requires manual work.
Can be used in combination.
Tackle Take 2: Explore program boundaries, extract actual edge cases. Can be automated.
BVA vs. BVT?
Why Automated Boundary Value Testing?
14/77
Why Automated Boundary Value Testing?
$ sudo -u# -1 id -u
15/77
Why Automated Boundary Value Testing?
$ sudo -u# -1 id -u
It is at the boundaries where interesting things
happen...
16/77
17/77
18/77
19/77
20/77
aBVA/aBVT literature
21/77
aBVA/aBVT literature
22/77
aBVA/aBVT literature
23/77
aBVA/aBVT literature
24/77
25/77
Specification:
inputs
outputs
requirements
constraints
26/77
program
Specification:
inputs
outputs
requirements
constraints
27/77
program
Specification:
tests
validate
Specification
inputs
outputs
requirements
constraints
28/77
Vision
program
Specification:
tests
validate
Specification
inputs
outputs
requirements
constraints augmented
process
29/77
Absolute vs. Relative Assessment
30/77
SUTx y
Absolute vs. Relative Assessment
31/77
SUTx y
Assert y == yexp
Absolute vs. Relative Assessment
32/77
SUTx y
Assert y == yexp
Absolute vs. Relative Assessment
33/77
SUTx y
x1 x2
y1 y2
SUT SUT
Assert y == yexp
Absolute vs. Relative Assessment
34/77
SUTx y
x1 x2
y1 y2
?
SUT SUT
Assert y == yexp
Absolute vs. Relative Assessment
35/77
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.
Automated BVT/BVA?
x1 x2
SUT
y1 y2
?
36/77
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.
Automated BVT/BVA?
x1 x2
SUT
y1 y2
?
37/77
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.

Kolmogorov Complexity has a potential
Automated BVT/BVA?
x1 x2
SUT
y1 y2
?
38/77
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.

Kolmogorov Complexity has a potential

Applicable for all data types
Automated BVT/BVA?
x1 x2
SUT
y1 y2
?
39/77
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.

Kolmogorov Complexity has a potential

Applicable for all data types

“Compression trick” makes it practical

CC ~ KC
Automated BVT/BVA?
x1 x2
SUT
y1 y2
?
40/77
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.

Kolmogorov Complexity has a potential

Applicable for all data types

“Compression trick” makes it practical

CC ~ KC

Normalized Information Distance (NID)
Automated BVT/BVA?
x1 x2
SUT
y1 y2
?
41/77
Diversity Corridor
42/77
Diversity Corridor
43/77
Diversity Corridor
44/77
Diversity of What?
SUT
SUT=Software Under Test
45/77
Diversity of What?
SUTInput
SUT=Software Under Test
46/77
Diversity of What?
SUTInput Output
SUT=Software Under Test
47/77
Diversity of What?
SUTInput Output
State
SUT=Software Under Test
48/77
Diversity of What?
SUTInput Output
State
SUT=Software Under Test
49/77
Diversity of What?
SUTInput Output
State
SUT=Software Under Test
50/77
Diversity of What?
SUTInput Output
State
SUT=Software Under Test
51/77
Diversity of What?
SUTInput Output
State
x
SUT=Software Under Test
52/77
Diversity of What?
SUTInput Output
State
x
Diversity(Execution1, Execution2) → A x B x C...
SUT=Software Under Test
53/77
Derivatives
● Slope of the tangent line to the graph at x
How sensitive to change is f in x?
54/77
Derivatives
● Slope of the tangent line to the graph at x
How sensitive to change is f in x?
secant
55/77
Derivatives
● Slope of the tangent line to the graph at x
How sensitive to change is f in x?
secant
56/77
Input Mutation
How do I get bmin then?

May require exploring the SUT’s behavior on a number of “close
values”

e.g. via Search-based Software Engineering with Mutators
57/77
Boundary Without Oracle
month
day of month
year
58/77
aBVA 4 ML?
SUTInput Output
59/77
aBVA 4 ML?
anything anything
SUTInput Output
Domain:
60/77
aBVA 4 ML?
anything anything
SUTInput Output
Domain:
61/77
aBVA 4 ML?
SUTInput Output
Domain:
62/77
aBVA 4 ML?
Input Output
Domain:
63/77
aBVA 4 ML?
MUT=Model Under Test
Input Output
Domain:
MUT
(ANN)
64/77
aBVA 4 ML?
[0,1]^n U {0,1}^n [0,1]^n | {0,1}^n
MUT=Model Under Test
Input Output
Domain:
MUT
(ANN)
65/77
aBVA 4 ML?
[0,1]^n U {0,1}^n [0,1]^n | {0,1}^ndistance + direction
MUT=Model Under Test
Input Output
Domain:
MUT
(ANN)
66/77
This is where we are...
67/77
This is where we are...
● All diversity measures may not be practical
68/77
This is where we are...
● All diversity measures may not be practical
● deterministic vs stochastic
69/77
This is where we are...
● All diversity measures may not be practical
● deterministic vs stochastic
● Discrimination on boundary
70/77
This is where we are...
● All diversity measures may not be practical
● deterministic vs stochastic
● Discrimination on boundary
● single metric may not discriminate well
● output diversity upper hand (?)
71/77
This is where we are...
● All diversity measures may not be practical
● deterministic vs stochastic
● Discrimination on boundary
● single metric may not discriminate well
● output diversity upper hand (?)
● distance metric has an impact, NCD possibly
too simplistic (to be continued...)
72/77
Challenges
73/77
Challenges
74/77
Challenges
size
75/77
Challenges
sizedirection
76/77
Challenges
sizedirection
ruggedness
77/77
TestVikings

“We come over land and sea to break your code”
Find us at: https://testvikings.github.io/
I don’t tweet but post on LinkedIn (Felix Dobslaw)

More Related Content

Similar to Using Diversity for Automated Boundary Value Testing

A Future where we don’t write tests
A Future where we don’t write testsA Future where we don’t write tests
A Future where we don’t write tests
Felix Dobslaw
 
Wcre08.ppt
Wcre08.pptWcre08.ppt
Sattose 2020 presentation
Sattose 2020 presentationSattose 2020 presentation
Sattose 2020 presentation
Céline Deknop
 
Spock Framework
Spock FrameworkSpock Framework
Production model lifecycle management 2016 09
Production model lifecycle management 2016 09Production model lifecycle management 2016 09
Production model lifecycle management 2016 09
Greg Makowski
 
Leaping over the Boundaries of Boundary Value Analysis
Leaping over the Boundaries of Boundary Value AnalysisLeaping over the Boundaries of Boundary Value Analysis
Leaping over the Boundaries of Boundary Value Analysis
TechWell
 
Feature Toggles On Steroids
Feature Toggles On SteroidsFeature Toggles On Steroids
Feature Toggles On Steroids
Java Usergroup Berlin-Brandenburg
 
Feature-Oriented Software Evolution
Feature-Oriented Software EvolutionFeature-Oriented Software Evolution
Feature-Oriented Software Evolution
Leonardo Passos
 
It Does What You Say, Not What You Mean: Lessons From A Decade of Program Repair
It Does What You Say, Not What You Mean: Lessons From A Decade of Program RepairIt Does What You Say, Not What You Mean: Lessons From A Decade of Program Repair
It Does What You Say, Not What You Mean: Lessons From A Decade of Program Repair
Claire Le Goues
 
How much do we know about Object-Oriented Programming?
How much do we know about Object-Oriented Programming?How much do we know about Object-Oriented Programming?
How much do we know about Object-Oriented Programming?
Sandro Mancuso
 
Tool wear monitoring and alarm system based on pattern recognition with logic...
Tool wear monitoring and alarm system based on pattern recognition with logic...Tool wear monitoring and alarm system based on pattern recognition with logic...
Tool wear monitoring and alarm system based on pattern recognition with logic...
Nehem Tudu
 
Applying Anti-Reversing Techniques to Java Bytecode
Applying Anti-Reversing Techniques to Java BytecodeApplying Anti-Reversing Techniques to Java Bytecode
Applying Anti-Reversing Techniques to Java Bytecode
Teodoro Cipresso
 
Fpga 07-port-rules-gate-delay-data-flow-carry-look-ahead-adder
Fpga 07-port-rules-gate-delay-data-flow-carry-look-ahead-adderFpga 07-port-rules-gate-delay-data-flow-carry-look-ahead-adder
Fpga 07-port-rules-gate-delay-data-flow-carry-look-ahead-adderMalik Tauqir Hasan
 
Robustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning MethodsRobustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning Methods
Data Science Milan
 
DSUS_MAO_2012_Jie
DSUS_MAO_2012_JieDSUS_MAO_2012_Jie
DSUS_MAO_2012_Jie
MDO_Lab
 
Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
Nishanth Harapanahalli
 
Ml1 introduction to-supervised_learning_and_k_nearest_neighbors
Ml1 introduction to-supervised_learning_and_k_nearest_neighborsMl1 introduction to-supervised_learning_and_k_nearest_neighbors
Ml1 introduction to-supervised_learning_and_k_nearest_neighbors
ankit_ppt
 
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile AppsDeep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
Davide De Chiara
 
Evaluating Model Testing and Model Checking for Finding Requirements Violatio...
Evaluating Model Testing and Model Checking for Finding Requirements Violatio...Evaluating Model Testing and Model Checking for Finding Requirements Violatio...
Evaluating Model Testing and Model Checking for Finding Requirements Violatio...
Lionel Briand
 

Similar to Using Diversity for Automated Boundary Value Testing (20)

A Future where we don’t write tests
A Future where we don’t write testsA Future where we don’t write tests
A Future where we don’t write tests
 
Wcre08.ppt
Wcre08.pptWcre08.ppt
Wcre08.ppt
 
Sattose 2020 presentation
Sattose 2020 presentationSattose 2020 presentation
Sattose 2020 presentation
 
Spock Framework
Spock FrameworkSpock Framework
Spock Framework
 
Production model lifecycle management 2016 09
Production model lifecycle management 2016 09Production model lifecycle management 2016 09
Production model lifecycle management 2016 09
 
Leaping over the Boundaries of Boundary Value Analysis
Leaping over the Boundaries of Boundary Value AnalysisLeaping over the Boundaries of Boundary Value Analysis
Leaping over the Boundaries of Boundary Value Analysis
 
Feature Toggles On Steroids
Feature Toggles On SteroidsFeature Toggles On Steroids
Feature Toggles On Steroids
 
Feature-Oriented Software Evolution
Feature-Oriented Software EvolutionFeature-Oriented Software Evolution
Feature-Oriented Software Evolution
 
It Does What You Say, Not What You Mean: Lessons From A Decade of Program Repair
It Does What You Say, Not What You Mean: Lessons From A Decade of Program RepairIt Does What You Say, Not What You Mean: Lessons From A Decade of Program Repair
It Does What You Say, Not What You Mean: Lessons From A Decade of Program Repair
 
How much do we know about Object-Oriented Programming?
How much do we know about Object-Oriented Programming?How much do we know about Object-Oriented Programming?
How much do we know about Object-Oriented Programming?
 
Tool wear monitoring and alarm system based on pattern recognition with logic...
Tool wear monitoring and alarm system based on pattern recognition with logic...Tool wear monitoring and alarm system based on pattern recognition with logic...
Tool wear monitoring and alarm system based on pattern recognition with logic...
 
Applying Anti-Reversing Techniques to Java Bytecode
Applying Anti-Reversing Techniques to Java BytecodeApplying Anti-Reversing Techniques to Java Bytecode
Applying Anti-Reversing Techniques to Java Bytecode
 
Fpga 07-port-rules-gate-delay-data-flow-carry-look-ahead-adder
Fpga 07-port-rules-gate-delay-data-flow-carry-look-ahead-adderFpga 07-port-rules-gate-delay-data-flow-carry-look-ahead-adder
Fpga 07-port-rules-gate-delay-data-flow-carry-look-ahead-adder
 
Robustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning MethodsRobustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning Methods
 
DSUS_MAO_2012_Jie
DSUS_MAO_2012_JieDSUS_MAO_2012_Jie
DSUS_MAO_2012_Jie
 
Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
 
Ml1 introduction to-supervised_learning_and_k_nearest_neighbors
Ml1 introduction to-supervised_learning_and_k_nearest_neighborsMl1 introduction to-supervised_learning_and_k_nearest_neighbors
Ml1 introduction to-supervised_learning_and_k_nearest_neighbors
 
Deep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile AppsDeep Parameters Tuning for Android Mobile Apps
Deep Parameters Tuning for Android Mobile Apps
 
Testing
TestingTesting
Testing
 
Evaluating Model Testing and Model Checking for Finding Requirements Violatio...
Evaluating Model Testing and Model Checking for Finding Requirements Violatio...Evaluating Model Testing and Model Checking for Finding Requirements Violatio...
Evaluating Model Testing and Model Checking for Finding Requirements Violatio...
 

More from Felix Dobslaw

Software testing research solving real-world problems
Software testing research solving real-world problemsSoftware testing research solving real-world problems
Software testing research solving real-world problems
Felix Dobslaw
 
wasp_2023.pdf
wasp_2023.pdfwasp_2023.pdf
wasp_2023.pdf
Felix Dobslaw
 
Sast 2021
Sast 2021Sast 2021
Sast 2021
Felix Dobslaw
 
Presentation at SCAM 2020
Presentation at SCAM 2020Presentation at SCAM 2020
Presentation at SCAM 2020
Felix Dobslaw
 
Estimating Return on Investment for GUI Test Automation Frameworks
Estimating Return on Investment for GUI Test Automation FrameworksEstimating Return on Investment for GUI Test Automation Frameworks
Estimating Return on Investment for GUI Test Automation Frameworks
Felix Dobslaw
 
Towards Automated Boundary Value Testing with Program Derivatives and Search
Towards Automated Boundary Value Testing with Program Derivatives and SearchTowards Automated Boundary Value Testing with Program Derivatives and Search
Towards Automated Boundary Value Testing with Program Derivatives and Search
Felix Dobslaw
 

More from Felix Dobslaw (6)

Software testing research solving real-world problems
Software testing research solving real-world problemsSoftware testing research solving real-world problems
Software testing research solving real-world problems
 
wasp_2023.pdf
wasp_2023.pdfwasp_2023.pdf
wasp_2023.pdf
 
Sast 2021
Sast 2021Sast 2021
Sast 2021
 
Presentation at SCAM 2020
Presentation at SCAM 2020Presentation at SCAM 2020
Presentation at SCAM 2020
 
Estimating Return on Investment for GUI Test Automation Frameworks
Estimating Return on Investment for GUI Test Automation FrameworksEstimating Return on Investment for GUI Test Automation Frameworks
Estimating Return on Investment for GUI Test Automation Frameworks
 
Towards Automated Boundary Value Testing with Program Derivatives and Search
Towards Automated Boundary Value Testing with Program Derivatives and SearchTowards Automated Boundary Value Testing with Program Derivatives and Search
Towards Automated Boundary Value Testing with Program Derivatives and Search
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Using Diversity for Automated Boundary Value Testing