Categorization and Representation of Functional Decomposition by Experts

Total Page:16

File Type:pdf, Size:1020Kb

Categorization and Representation of Functional Decomposition by Experts View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2008-09 Categorization and representation of functional decomposition by experts Melancon, Paul W. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/3950 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS CATEGORIZATION AND REPRESENTATION OF FUNCTIONAL DECOMPOSITION BY EXPERTS by Paul W. Melançon September 2008 Thesis Advisor: Gary O. Langford Second Reader: John Osmundson Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED September 2008 Master’s Thesis 4. TITLE AND SUBTITLE Categorization and Representation of Functional 5. FUNDING NUMBERS Decomposition by Experts 6. AUTHOR(S) Paul W. Melançon 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING Naval Undersea Warfare Center, Division Newport, Rhode Island AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited 13. ABSTRACT (maximum 200 words) The objective of this thesis is to investigate different approaches to identifying system functions. The approaches that are described are standard functional decomposition process, Unified Modeling Language (UML), System Modeling Language (SySML), and Integration Definition for Function Modeling (IDEF0). A discussion is presented on advantages and limitations of describing and using functions by means of graphical formatting. Improving system functionality by effective decomposition is vital to robust system development. However, not one of these approaches presents the best method for complete functional identification. While each has its benefits and should be considered during functional analysis, a good decomposition has proper interrogation of the functions by means of coupling and cohesion of the functionality as well as identifying functional overlap and underlap. Standard functional decomposition works best as the first step in laying out system functionality. Rigor and completeness are improved when followed up by UML, SySML, or even IDEF0. Value and risk of each function can and should be identified as a way of posing a series of questions that measure and analyze the appropriateness of the functional decomposition. Combining these different approaches can help lead to a more complete functional decomposition and therefore reduce the risk to system development. 14. SUBJECT TERMS functional decomposition, Function, function coupling, function cohesion, 15. NUMBER OF function overlap, function underlap, value of function, risk of function, complete functional PAGES decomposition 89 16. PRICE CODE 17. SECURITY 18. SECURITY 19. SECURITY 20. LIMITATION OF CLASSIFICATION OF CLASSIFICATION OF THIS CLASSIFICATION OF ABSTRACT REPORT PAGE ABSTRACT Unclassified Unclassified Unclassified UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 i THIS PAGE INTENTIONALLY LEFT BLANK ii Approved for public release; distribution is unlimited CATEGORIZATION AND REPRESENTATION OF FUNCTIONAL DECOMPOSITION BY EXPERTS Paul W. Melançon Civilian, Department of Defense B.S., University of Massachusetts, Dartmouth, 2001 Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN SYSTEMS ENGINEERING MANAGEMENT from the NAVAL POSTGRADUATE SCHOOL September 2008 Author: Paul W. Melançon Approved by: Lecturer, Gary O. Langford Thesis Advisor John Osmundson Second Reader David H. Olwell Chairman, Department of Systems Engineering iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT The objective of this thesis is to investigate different approaches to identifying system functions. The approaches that are described are standard functional decomposition process, Unified Modeling Language (UML), System Modeling Language (SySML), and Integration Definition for Function Modeling (IDEF0). A discussion is presented on advantages and limitations of describing and using functions by means of graphical formatting. Improving system functionality by effective decomposition is vital to robust system development. However, not one of these approaches presents the best method for complete functional identification. While each has its benefits and should be considered during functional analysis, a good decomposition has proper interrogation of the functions by means of coupling and cohesion of the functionality as well as identifying functional overlap and underlap. Standard functional decomposition works best as the first step in laying out system functionality. Rigor and completeness are improved when followed up by UML, SySML, or even IDEF0. Value and risk of each function can and should be identified as a way of posing a series of questions that measure and analyze the appropriateness of the functional decomposition. Combining these different approaches can help lead to a more complete functional decomposition and therefore reduce the risk to system development. v THIS PAGE INTENTIONALLY LEFT BLANK vi TABLE OF CONTENTS I. INTRODUCTION........................................................................................................1 A. BACKGROUND ..............................................................................................1 B. RESEARCH OBJECTIVE .............................................................................9 C. DEFINING COMPLEXITY, SYSTEM, AND FUNCTION......................10 1. Complexity..........................................................................................10 2. Definition of System...........................................................................11 3. The Term Function, Explained.........................................................14 D. A FRAMEWORK METHODOLOGY........................................................18 II. KEY FACTORS RELATED TO COMPLETE FUNCTIONAL DECOMPOSITIONS ................................................................................................23 A. COUPLING AND COHESION....................................................................23 B. DEALING WITH OVERLAPPING AND UNDER-LAPPING OF FUNCTIONS..................................................................................................27 C. FAILURE MODE ANALYSIS, AN INTERROGATION TECHNIQUE OF FUNCTIONS..................................................................29 III. DIFFERENT APPROACHES TO FUNCTIONAL DECOMPOSITION ...........33 A. UNIFIED MODELING LANGUAGE (UML)............................................34 1. Activity Diagram................................................................................36 2. Sequence Diagram .............................................................................37 3. Class Diagram ....................................................................................38 4. Collaboration Diagram......................................................................39 5. Statechart Diagram............................................................................40 6. Use Case Diagrams ............................................................................43 B. SYSTEM MODELING LANGUAGE (SYSML):.......................................45 1. The New Diagram; Requirement Diagram .....................................47 2. Differences between UML and SysML ............................................51 C. INTEGRATION DEFINITION FOR FUNCTION MODELING (IDEF0):..........................................................................................................54 IV. CONCLUSION ..........................................................................................................61 A. FUTURE WORK...........................................................................................62 LIST OF REFERENCES......................................................................................................67 INITIAL DISTRIBUTION LIST .........................................................................................71 vii THIS PAGE INTENTIONALLY LEFT BLANK viii LIST OF FIGURES Figure 1 Typical Functional Breakdown..........................................................................3 Figure 2 Typical Functional Decomposition (From Langford,
Recommended publications
  • Filling the Gap Between Business Process Modeling and Behavior Driven Development
    Filling the Gap between Business Process Modeling and Behavior Driven Development Rogerio Atem de Carvalho Rodrigo Soares Manhães Fernando Luis de Carvalho e Silva Nucleo de Pesquisa em Sistemas de Informação (NSI), Instituto Federal Fluminense (IFF), Brazil {ratem, rmanhaes, [email protected]} 1. Introduction Behavior Driven Development (NORTH, 2006) is a specification technique that is growing in acceptance in the Agile methods communities. BDD allows to securely verify that all functional requirements were treated properly by source code, by connecting the textual description of these requirements to tests. On the other side, the Enterprise Information Systems (EIS) researchers and practitioners defends the use of Business Process Modeling (BPM) to, before defining any part of the system, perform the modeling of the system's underlying business process. Therefore, it can be stated that, in the case of EIS, functional requirements are obtained by identifying Use Cases from the business process models. The aim of this paper is, in a narrower perspective, to propose the use of Finite State Machines (FSM) to model business process and then connect them to the BDD machinery, thus driving better quality for EIS. In a broader perspective, this article aims to provoke a discussion on the mapping of the various BPM notations, since there isn't a real standard for business process modeling (Moller et al., 2007), to BDD. Firstly a historical perspective of the evolution of previous proposals from which this one emerged will be presented, and then the reasons to change from Model Driven Development (MDD) to BDD will be presented also in a historical perspective.
    [Show full text]
  • Leading Practice: Test Strategy and Approach in Agile Projects
    CA SERVICES | LEADING PRACTICE Leading Practice: Test Strategy and Approach in Agile Projects Abstract This document provides best practices on how to strategize testing CA Project and Portfolio Management (CA PPM) in an agile project. The document does not include specific test cases; the list of test cases and steps for each test case are provided in a separate document. This document should be used by the agile project team that is planning the testing activities, and by end users who perform user acceptance testing (UAT). Concepts Concept Description Test Approach Defines testing strategy, roles and responsibilities of various team members, and test types. Testing Environments Outlines which testing is carried out in which environment. Testing Automation and Tools Addresses test management and automation tools required for test execution. Risk Analysis Defines the approach for risk identification and plans to mitigate risks as well as a contingency plan. Test Planning and Execution Defines the approach to plan the test cases, test scripts, and execution. Review and Approval Lists individuals who should review, approve and sign off on test results. Test Approach The test approach defines testing strategy, roles and responsibilities of various team members, and the test types. The first step is to define the testing strategy. It should describe how and when the testing will be conducted, who will do the testing, the type of testing being conducted, features being tested, environment(s) where the testing takes place, what testing tools are used, and how are defects tracked and managed. The testing strategy should be prepared by the agile core team.
    [Show full text]
  • Integration Definition for Function Modeling (IDEF0)
    NIST U.S. DEPARTMENT OF COMMERCE PUBLICATIONS £ Technology Administration National Institute of Standards and Technology FIPS PUB 183 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION INTEGRATION DEFINITION FOR FUNCTION MODELING (IDEFO) » Category: Software Standard SUBCATEGORY: MODELING TECHNIQUES 1993 December 21 183 PUB FIPS JK- 45C .AS A3 //I S3 IS 93 FIPS PUB 183 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION INTEGRATION DEFINITION FOR FUNCTION MODELING (IDEFO) Category: Software Standard Subcategory: Modeling Techniques Computer Systems Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Issued December 21, 1993 U.S. Department of Commerce Ronald H. Brown, Secretary Technology Administration Mary L. Good, Under Secretary for Technology National Institute of Standards and Technology Arati Prabhakar, Director Foreword The Federal Information Processing Standards Publication Series of the National Institute of Standards and Technology (NIST) is the official publication relating to standards and guidelines adopted and promulgated under the provisions of Section 111 (d) of the Federal Property and Administrative Services Act of 1949 as amended by the Computer Security Act of 1987, Public Law 100-235. These mandates have given the Secretary of Commerce and NIST important responsibilities for improving the utilization and management of computer and related telecommunications systems in the Federal Government. The NIST, through its Computer Systems Laboratory, provides leadership, technical guidance,
    [Show full text]
  • Sysml Distilled: a Brief Guide to the Systems Modeling Language
    ptg11539604 Praise for SysML Distilled “In keeping with the outstanding tradition of Addison-Wesley’s techni- cal publications, Lenny Delligatti’s SysML Distilled does not disappoint. Lenny has done a masterful job of capturing the spirit of OMG SysML as a practical, standards-based modeling language to help systems engi- neers address growing system complexity. This book is loaded with matter-of-fact insights, starting with basic MBSE concepts to distin- guishing the subtle differences between use cases and scenarios to illu- mination on namespaces and SysML packages, and even speaks to some of the more esoteric SysML semantics such as token flows.” — Jeff Estefan, Principal Engineer, NASA’s Jet Propulsion Laboratory “The power of a modeling language, such as SysML, is that it facilitates communication not only within systems engineering but across disci- plines and across the development life cycle. Many languages have the ptg11539604 potential to increase communication, but without an effective guide, they can fall short of that objective. In SysML Distilled, Lenny Delligatti combines just the right amount of technology with a common-sense approach to utilizing SysML toward achieving that communication. Having worked in systems and software engineering across many do- mains for the last 30 years, and having taught computer languages, UML, and SysML to many organizations and within the college setting, I find Lenny’s book an invaluable resource. He presents the concepts clearly and provides useful and pragmatic examples to get you off the ground quickly and enables you to be an effective modeler.” — Thomas W. Fargnoli, Lead Member of the Engineering Staff, Lockheed Martin “This book provides an excellent introduction to SysML.
    [Show full text]
  • Identifying and Defining Relationships: Techniques for Improving Student Systemic Thinking
    AC 2011-897: IDENTIFYING AND DEFINING RELATIONSHIPS: TECH- NIQUES FOR IMPROVING STUDENT SYSTEMIC THINKING Cecelia M. Wigal, University of Tennessee, Chattanooga Cecelia M. Wigal received her Ph.D. in 1998 from Northwestern University and is presently a Professor of Engineering and Assistant Dean of the College of Engineering and Computer Science at the University of Tennessee at Chattanooga (UTC). Her primary areas of interest and expertise include complex process and system analysis, process improvement analysis, and information system analysis with respect to usability and effectiveness. Dr. Wigal is also interested in engineering education reform to address present and future student and national and international needs. c American Society for Engineering Education, 2011 Identifying and Defining Relationships: Techniques for Improving Student Systemic Thinking Abstract ABET, Inc. is looking for graduating undergraduate engineering students who are systems thinkers. However, genuine systems thinking is contrary to the traditional practice of using linear thinking to help solve design problems often used by students and many practitioners. Linear thinking has a tendency to compartmentalize solution options and minimize recognition of relationships between solutions and their elements. Systems thinking, however, has the ability to define the whole system, including its environment, objectives, and parts (subsystems), both static and dynamic, by their relationships. The work discussed here describes two means of introducing freshman engineering students to thinking systemically or holistically when understanding and defining problems. Specifically, the modeling techniques of Rich Pictures and an instructor generated modified IDEF0 model are discussed. These techniques have roles in many applications. In this case they are discussed in regards to their application to the design process.
    [Show full text]
  • Matters of (Meta-) Modeling
    Appeared in the Journal on Software and Systems Modeling, Volume 5, Number 4, pp. 369-385, December 2006 Matters of (Meta-) Modeling Thomas Kuh¨ ne Darmstadt University of Technology, Darmstadt, Germany e-mail: [email protected] Abstract With the recent trend to model driven engineering ontologies for the basic terms of their discipline, any com- a common understanding of basic notions such as “model” munication may create the illusion of agreement where there and “metamodel” becomes a pivotal issue. Even though these is none, i.e., unnoticed misunderstandings, and raise barriers notions have been in widespread use for quite a while, there of communication where they are just accidental. is still little consensus about when exactly it is appropriate In the following we will focus on the term “model” in the to use them. The aim of this article is to start establishing a context of model driven engineering. Our models are thus all consensus about generally acceptable terminology. Its main language-based in nature, unlike, e.g., physical scale models contributions are the distinction between two fundamental- and they describe something as opposed to models in mathe- ly different kinds of model roles, i.e. “token model” versus matics which are understood as interpretations of a theory [3]. “type model”1, a formal notion of “metaness”, and the consi- In an attempt to define the scope of the notion “model” we deration of “generalization” as yet another basic relationship should consider how it has been traditionally used in softwa- between models. In particular, the recognition of the funda- re engineering.
    [Show full text]
  • Introduction to Systems Modeling Languages
    Fundamentals of Systems Engineering Prof. Olivier L. de Weck, Mark Chodas, Narek Shougarian Session 3 System Modeling Languages 1 Reminder: A1 is due today ! 2 3 Overview Why Systems Modeling Languages? Ontology, Semantics and Syntax OPM – Object Process Methodology SySML – Systems Modeling Language Modelica What does it mean for Systems Engineering of today and tomorrow (MBSE)? 4 Exercise: Describe the “Mr. Sticky” System Work with a partner (5 min) Use your webex notepad/white board I will call on you randomly We will compare across student teams © source unknown. All rights reserved. This content is excluded from our Creative Commons license. For more information, see http://ocw.mit.edu/help/faq-fair-use/. 5 Why Systems Modeling Languages? Means for describing artifacts are traditionally as follows: Natural Language (English, French etc….) Graphical (Sketches and Drawings) These then typically get aggregated in “documents” Examples: Requirements Document, Drawing Package Technical Data Package (TDP) should contain all info needed to build and operate system Advantages of allowing an arbitrary description: Familiarity to creator of description Not-confining, promotes creativity Disadvantages of allowing an arbitrary description: Room for ambiguous interpretations and errors Difficult to update if there are changes Handoffs between SE lifecycle phases are discontinuous Uneven level of abstraction Large volume of information that exceeds human cognitive bandwidth Etc…. 6 System Modeling Languages Past efforts
    [Show full text]
  • Efficient Black-Box JTAG Discovery
    Ca’ Foscari University of Venice Department of Environmental Sciences, Informatics and Statistics Master’s Degree programme Computer Science, Software Dependability and Cyber Security Second Cycle (D.M. 270/2004) Master Thesis Efficient Black-box JTAG Discovery Supervisor: Graduand: Prof. Riccardo Focardi Riccardo Francescato Matriculation Number 857609 Assistant supervisor: Dott. Francesco Palmarini Academic Year 2016 - 2017 Riccardo Francescato Matriculation Number 857609 Efficient Black-box JTAG Discovery, Master Thesis c February 2018. Abstract Embedded devices represent the most widespread form of computing device in the world. Almost every consumer product manufactured in the last decades contains an embedded system, e.g., refrigerators, smart bulbs, activity trackers, smart watches and washing machines. These computing devices are also used in safety and security- critical systems, e.g., autonomous driving cars, cryptographic tokens, avionics, alarm systems. Often, manufacturers do not take much into consideration the attack surface offered by low-level interfaces such as JTAG. In the last decade, JTAG port has been used by the research community as an entry point for a number of attacks and reverse engineering techniques. Therefore, finding and identifying the JTAG port of a device or a de-soldered integrated circuit (IC) can be the first step required for performing a successful attack. In this work, we analyse the design of JTAG port and develop methods and algorithms aimed at searching the JTAG port. More specifically we will provide an introduction to the problem and the related attacks already documented in the literature. Moreover, we will provide to the reader the basics necessary to understand this work (background on JTAG and basic electronic terminology).
    [Show full text]
  • Modelling, Analysis and Design of Computer Integrated Manueactur1ng Systems
    MODELLING, ANALYSIS AND DESIGN OF COMPUTER INTEGRATED MANUEACTUR1NG SYSTEMS Volume I of II ABDULRAHMAN MUSLLABAB ABDULLAH AL-AILMARJ October-1998 A thesis submitted for the DEGREE OP DOCTOR OF.PHILOSOPHY MECHANICAL ENGINEERING DEPARTMENT, THE UNIVERSITY OF SHEFFIELD 3n ti]S 5íamc of Allai]. ¿Hoot (gractouo. iHHoßt ¿Merciful. ACKNOWLEDGEMENTS I would like to express my appreciation and thanks to my supervisor Professor Keith Ridgway for devoting freely of his time to read, discuss, and guide this research, and for his assistance in selecting the research topic, obtaining special reference materials, and contacting industrial collaborations. His advice has been much appreciated and I am very grateful. I would like to thank Mr Bruce Lake at Brook Hansen Motors who has patiently answered my questions during the case study. Finally, I would like to thank my family for their constant understanding, support and patience. l To my parents, my wife and my son. ABSTRACT In the present climate of global competition, manufacturing organisations consider and seek strategies, means and tools to assist them to stay competitive. Computer Integrated Manufacturing (CIM) offers a number of potential opportunities for improving manufacturing systems. However, a number of researchers have reported the difficulties which arise during the analysis, design and implementation of CIM due to a lack of effective modelling methodologies and techniques and the complexity of the systems. The work reported in this thesis is related to the development of an integrated modelling method to support the analysis and design of advanced manufacturing systems. A survey of various modelling methods and techniques is carried out. The methods SSADM, IDEFO, IDEF1X, IDEF3, IDEF4, OOM, SADT, GRAI, PN, 10A MERISE, GIM and SIMULATION are reviewed.
    [Show full text]
  • A Method for Business Process Model Analysis and Improvement
    A Method for Business Process Model Analysis and Improvement Andrii Kopp[0000-0002-3189-5623] and Dmytro Orlovskyi[0000-0002-8261-2988] National Technical University “KhPI”, Kyrpychova str. 2, 61002 Kharkiv, Ukraine {kopp93, orlovskyi.dm}@gmail.com Abstract. Since business process modeling is considered as the foundation of Business Process Management, it is required to design understandable and mod- ifiable process models used to analyze and improve depicted business process- es. Therefore, this article proposes a method for business process model analy- sis and improvement. The lifecycle of Business Process Management from business process modeling to applying the Business Intelligence and process mining techniques is considered. Existing approaches to business process model analysis are reviewed. Proposed method is based on best practices in business process modeling, process model metrics, and corresponding thresholds. The usage of business process model metrics and thresholds to formalize process modeling guidelines is outlined, as well as the procedure of business process model analysis and improvement is shown. The application of Business Intelli- gence techniques to support the proposed method is demonstrated. Keywords: Business Process Management, Business Process Modeling, Pro- cess Model Analysis, Process Model Improvement. 1 Introduction Today Business Process Management (BPM) is one of the most popular management concepts. It is based on the set of methods and tools used to design, analyze, improve, and automate organizational business processes. In its turn, business process is a structured set of activities that takes one or more kinds of input and produces a prod- uct or service valuable for a particular customer [1]. According to professor van der Aalst [2], BPM combines knowledge from infor- mation technology and knowledge from management sciences and applies this to operational business processes.
    [Show full text]
  • Integration of Model-Based Systems Engineering and Virtual Engineering Tools for Detailed Design
    Scholars' Mine Masters Theses Student Theses and Dissertations Spring 2011 Integration of model-based systems engineering and virtual engineering tools for detailed design Akshay Kande Follow this and additional works at: https://scholarsmine.mst.edu/masters_theses Part of the Systems Engineering Commons Department: Recommended Citation Kande, Akshay, "Integration of model-based systems engineering and virtual engineering tools for detailed design" (2011). Masters Theses. 5155. https://scholarsmine.mst.edu/masters_theses/5155 This thesis is brought to you by Scholars' Mine, a service of the Missouri S&T Library and Learning Resources. This work is protected by U. S. Copyright Law. Unauthorized use including reproduction for redistribution requires the permission of the copyright holder. For more information, please contact [email protected]. INTEGRATION OF MODEL-BASED SYSTEMS ENGINEERING AND VIRTUAL ENGINEERING TOOLS FOR DETAILED DESIGN by AKSHA Y KANDE A THESIS Presented to the Faculty of the Graduate School of the MISSOURI UNIVERSITY OF SCIENCE AND TECHNOLOGY In Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE IN SYSTEMS ENGINEERING 2011 Approved by Steve Corns, Advisor Cihan Dagli Scott Grasman © 2011 Akshay Kande All Rights Reserved 111 ABSTRACT Design and development of a system can be viewed as a process of transferring and transforming data using a set of tools that form the system's development environment. Conversion of the systems engineering data into useful information is one of the prime objectives of the tools used in the process. With complex systems, the objective is further augmented with a need to represent the information in an accessible and comprehensible manner.
    [Show full text]
  • A Confused Tester in Agile World … Qa a Liability Or an Asset
    A CONFUSED TESTER IN AGILE WORLD … QA A LIABILITY OR AN ASSET THIS IS A WORK OF FACTS & FINDINGS BASED ON TRUE STORIES OF ONE & MANY TESTERS !! J Presented By Ashish Kumar, WHAT’S AHEAD • A STORY OF TESTING. • FROM THE MIND OF A CONFUSED TESTER. • FEW CASE STUDIES. • CHALLENGES IDENTIFIED. • SURVEY STUDIES. • GLOBAL RESPONSES. • SOLUTION APPROACH. • PRINCIPLES AND PRACTICES. • CONCLUSION & RECAP. • Q & A. A STORY OF TESTING IN AGILE… HAVE YOU HEARD ANY OF THESE ?? • YOU DON’T NEED A DEDICATED SOFTWARE TESTING TEAM ON YOUR AGILE TEAMS • IF WE HAVE BDD,ATDD,TDD,UI AUTOMATION , UNIT TEST >> WHAT IS THE NEED OF MANUAL TESTING ?? • WE WANT 100% AUTOMATION IN THIS PROJECT • TESTING IS BECOMING BOTTLENECK AND REASON OF SPRINT FAILURE • REPEATING REGRESSION IS A BIG TASK AND AN OVERHEAD • MICROSOFT HAS NO TESTERS NOT EVEN GOOGLE, FACEBOOK AND CISCO • 15K+ DEVELOPERS /4K+ PROJECTS UNDER ACTIVE • IN A “MOBILE-FIRST AND CLOUD-FIRST WORLD.” DEVELOPMENT/50% CODE CHANGES PER MONTH. • THE EFFORT, KNOWN AS AGILE SOFTWARE DEVELOPMENT, • 5500+ SUBMISSION PER DAY ON AVERAGE IS DESIGNED TO LOWER COSTS AND HONE OPERATIONS AS THE COMPANY FOCUSES ON BUILDING CLOUD AND • 20+ SUSTAINED CODE CHANGES/MIN WITH 60+PEAKS MOBILE SOFTWARE, SAY ANALYSTS • 75+ MILLION TEST CASES RUN PER DAY. • MR. NADELLA TOLD BLOOMBERG THAT IT MAKES MORE • DEVELOPERS OWN TESTING AND DEVELOPERS OWN SENSE TO HAVE DEVELOPERS TEST & FIX BUGS INSTEAD OF QUALITY. SEPARATE TEAM OF TESTERS TO BUILD CLOUD SOFTWARE. • GOOGLE HAVE PEOPLE WHO COULD CODE AND WANTED • SUCH AN APPROACH, A DEPARTURE FROM THE TO APPLY THAT SKILL TO THE DEVELOPMENT OF TOOLS, COMPANY’S TRADITIONAL PRACTICE OF DIVIDING INFRASTRUCTURE, AND TEST AUTOMATION.
    [Show full text]