Showing posts with label quality attribute. Show all posts
Showing posts with label quality attribute. Show all posts

April 24, 2016

Finding the Truth Behind Minimum Viable Products

When we start off building a new feature or product, there are a million questions to answer. “Is this solving the customer’s problem? Does this problem really exist? What does the user expect to gain with the end result?” We have to find the answers to these questions before committing ourselves to building a solution. This is why starting with a minimum feature set is dangerous. When you jump into building a version one of a new product or feature you forget to learn. Experimenting helps you discover your customer’s problems and the appropriate solutions for them by answering these questions. It also doesn’t end with just one experiment. You should have multiple follow-ups that keep answering questions. The more you answer before committing yourself to the final solution, the less uncertainty there is around whether users will want or use it.


This finance trend is so hot even Amazon wants in

This would be a logical progression for Amazon, which already has a significant and active user base. Amazon has been experiencing increased growth tied to payments, as its payments unit has 23 million active users and has recorded 200% year-over-year growth in merchants adding the "Pay with Amazon" buy button to their online stores. There is also precedent for Amazon to make such a move. Chinese e-commerce giant Alipay has more than 450 million monthly active users and has more than 50% of the online payments market in China. So Amazon could be on the path to building up a similar type of momentum with its own customers. Fintech acquisitions would also make Amazon more competitive with other checkout services such as Apple Pay and Visa Checkout.


Intel Pivots From PCs to Cloud

"The data center and Internet of Things businesses are now Intel's primary growth engines, and combined with memory and FPGAs, form and fuel a virtuous cycle of growth," CEO Brian Krzanich said. "Together these businesses delivered $2.2 billion in revenue growth last year, made up 40 percent of our revenue and the majority of our operating profit." Details of the cuts will be announced in the weeks, he said, adding that the restructuring was not something he took lightly. Krzanich has been focused on making this transitional move since he became CEO three years ago. The restructuring announcement was made alongside Intel's first-quarter earnings report.


Bitcoin and Blockchain Have Their Own Futures

Gil Luria, in response to the question by Bloomberg’s Joe Weisenthal and Scarlet Fu about blockchain technology, clarifies the difference between bitcoin and its underlying technology. Blockchain is superseding bitcoin when it comes to investments made by big banks and investment firms. Many banking and financial institutions have already invested their time and resources in the development of a private blockchain network for their regular operations. While bitcoin is used for payment applications, blockchain is used for an entirely different range of applications. According to him, blockchain is a vast tool suitable for asset classes while bitcoin serves a much simpler purpose of making payments and executing simple banking functions.


7 Test Automation Requirements for Higher Software Quality

For unit testing, there are many testing frameworks developers use to ensure that their code does not break. JUnit in Java and Karma in JavaScript are some examples that most organized development teams should already be using. As for larger-scale integration tests, scripts are usually created to simplify tasks that would be too tedious to perform manually. However, creating these automated tests is often time-consuming and not cost-effective, especially if the environment requires many components and environmental configurations to be observed and coordinated. Automated regression testing, which largely relies on the user interface, is very effective, and many QA professionals are achieving excellent results with programmatic approaches such as APIs and service virtualization testing.


Man vs. Tool? On the Role of Software Tools and Human Experts in SQA Activities

There are several tasks that can only be performed by human experts and not by software tools (such as ‘Define relevant quality aspects/ scope of analysis/ quality goals’ or ‘Configure/ customize/ administrate software tools’). Furthermore, there are several tasks that have to be completed jointly by software tools and human experts because each contributes a subpart of the overall task (for example ‘Analyze software quality’ or ‘Perform tests’). Hence, we conclude that a combination of software tools and human expertise should be used in software quality activities (‘man and tool’ instead of ‘man vs. tool’). Only the combination of both gives a holistic picture of software quality and only human commitment ensures software quality and its improvement.


Reasoning About Software Quality Attributes

Just as general scenarios provide a template for specifying quality attribute requirements, quality attribute design primitives are templates for "chunks" of architectural designs that target the achievement of specific quality attribute goals. Attribute primitives provide building blocks for constructing architectures. However, they are building blocks with a focus on achieving quality attribute goals such as performance, reliability and modifiability goals. Quality attribute design primitives will be codified in a manner that illustrates how they contribute to the achievement of quality attributes. Therefore each attribute primitive will be described not only in terms of their constituent components and connectors, but also in terms of the qualitative and/or quantitative models that can be used to argue how they affect quality attributes.


A Code Quality Problem in Washington State Puts Dangerous Criminals Back on the Street

A defect in the software used to calculate early release resulted in good behavior credits being applied to inmates. These inmates were not supposed to receive the credits and as a result were allowed out early. The issue was flagged more than three years ago when a family was notified about the early release of a dangerous perpetrator. Nick went on to explain that the family calculated the date themselves and contacted the department about the miscalculation. After the software defect was noticed in 2012, the issue remained in tact because the department did not take measures to fix the problem. The issue was brought to the governor’s attention in December of 2015, who immediately began working to resolve the issue.


11 Myths About Software Qualification and Certification

With software taking on an ever-greater role in embedded systems, companies are realizing that “quality code” requires more than just the developer’s claim. Even for systems that don’t require formal certification for functional safety or security, software qualification is becoming more common. After all, who really wants to risk expensive field support, product recalls, or even legal action if software fails? Still, at least 11 myths continue to circulate about software qualification and certification.


Characteristics of a Great Scrum Team

According to the Scrum Guide the Scrum Master is responsible for ensuring Scrum is understood and enacted. Scrum Masters do this by ensuring that the Scrum Team adheres to Scrum theory, practices, and rules. The Scrum Master is a servant-leader for the Scrum Team. The Scrum Master helps those outside the Scrum Team understand which of their interactions with the Scrum Team are helpful and which aren’t. The Scrum Master helps everyone change these interactions to maximize the value created by the Scrum Team. The role of a Scrum Master is one of many stances and diversity. A great Scrum Master is aware of them and knows when and how to apply them, depending on situation and context. Everything with the purpose of helping people understand and apply the Scrum framework better.



Quote for the day:


"The value of a company is the sum of the problems you solve." -- Daniel Ek


July 06, 2014

Focussed topic: Service Oriented Architecture

Service Oriented Architecture: SOA
Services are a group of methods that contain the business logic to connect a DB or other services. Methods have clearly defined and published methods for use by the clients as a black box. So what is a black box? It's nothing but a system or an object that can be viewed in terms of its input, output and transfer characteristics without knowledge of its internal workings. Across the platforms these methods can be accessed, no matter what your client developing a UI in C# or Java or any latest technology. It decouples the business services from the technical services, in other words the service methods having the business logic is not coupled with the specific programming language, both will react independently.


Integrated Load Test Analysis
What makes the integrated approach to load testing critical to those of us who have only had access to the external, Web Load Test data in the past is that we can immediately draw correlations between events inside the datacenter and the performance effects we are capturing outside the firewall. By integrating a few key Web Load Test metrics (Average Response Time, Transactions per Minute, and Total VUs) with select PureStack metrics (Number of Confluence Requests in the last 10 seconds and CPU percentages), the team was quickly able to have in-depth information available to them throughout the load test. Finding this high load job was a bonus of the load test, which clearly pointed out that the system was undersized for the load that the Portal team was expecting.


How SMAC is empowering Business Process Management
When it comes to improving processes, visibility is one of the most important attributes of a platform. Most of the commercial BPM products now provide complete process visibility with real-time analytics to help business users quickly and easily make changes to processes. The built-in dashboards make it easier to recognize performance issues in real-time and take corrective actions when needed. In order to operationalize insights from big data, or apply contextual information from mobile engagements, business processes must be redesigned to apply those insights.


Service Oriented Architecture Quality Evaluation
This paper presents a semi-automated method for evaluating SOAs called SOAQE, correcting defects observed so far with existing methods such as lacks of pertinence and accuracy for evaluation results. SOAQE takes as a starting point the McCall model, describing software quality, which led to an international standard for the evaluation of software quality (ISO/IEC 9126-1, 2001). This model is organized around three types of quality attributes (factors, criteria and metrics). The SOAQE method consists in decomposing the whole architecture and evaluating it according to the McCall model, i.e. a list of quality factors arising from business needs grouping criteria composed by metrics


An Event-Driven Service-Oriented Architecture Model For Enterprise Applications
Enterprise Applications are difficult to implement and maintain because they require a monolith of code to incorporate required business processes. Service-oriented architecture is one solution, but challenges of dependency and software complexity remain. We propose Event-Driven Service-Oriented Architecture, which combines the benefits of component-based software development, event-driven architecture, and SOA.


The Open Group Open Platform 3.0™ Starts to Take Shape
The Open Platform 3.0 standard will have other common artifacts: architectural principles, stakeholder definitions and descriptions, and so on. Independently-developed architectures that use them can be integrated more easily. Enterprises develop their architectures independently, but engage with other enterprises in business ecosystems that require shared solutions. Increasingly, business relationships are dynamic, and there is no time to develop an agreed ecosystem architecture from scratch. Use of the same architecture platform, with a common architecture environment including elements such as principles, stakeholder concerns, and basic models, enables the enterprise architectures to be integrated, and shared solutions to be developed quickly.


Why Obama Administration Should Have Paid More Attention to Load Testing
It seems like those responsible for deploying the site didn't really appreciate the importance of load testing, which is especially surprising when you consider that the website had in fact failed a pre-launch load test miserably. Of course, politics came into play as the deadline for the website was non-negotiable. But with all the red flags warning of failure, load testing should have played a much more critical role ... big issue with HealthCare.gov was that the contractors claimed they didn't have enough time and felt extreme pressure to roll out the website before it was properly tested. If load testing occurred earlier in the website development phase, testers would have been able to identify the parts of the website that were not working properly.


Building and Testing a Microservice in a Service-Oriented Architecture
The microservice architectural style is an approach to developing a single application as a suite of small services, each running in its own process and communicating with lightweight mechanisms, often an HTTP resource API. These services are built around business capabilities and independently deployable by fully automated deployment machinery. ... One of the advantages of architecting your application in this style is that Microservices aren’t tied to a particular technology stack. This gave us the flexibility to choose technologies instead of defaulting to a technology that may or may not make sense.


Burn-Down or Burn-Out? How to Beat the Red-Sprint Agile Anti-Pattern
One of the key and often much underestimated benefits of working in agile teams, whether working on products or projects, is the idea of sustainable pace. Sustainable pace makes sure that the team retains its cool even under time pressure, which is common in software development. Those of you who have been part of agile teams will have noticed that achieving sustainable pace is not always easy. Either project management is chasing unrealistic estimates or is trying to prevent overruns or management expects ever-increasing productivity to meet a shorter time-to-market for their products.


Privacy vs personalization: The risks and rewards of engineered serendipity
“The notion of ‘designing for serendipity’ is an oxymoron because once we try to ‘engineer’ it into a system, users may no longer perceive the experience as serendipitous,” says Dr. Stephann Makri, a lecturer in Information Interaction at City University in London. “Designers of interactive systems shouldn’t try to offer serendipity on a plate. Instead, they should design tools that create opportunities for users to have experiences they might perceive as serendipitous.” Nonetheless this reworked notion of serendipity is here to stay on the web. With the rise of machine learning, a growing number of online publishers are using complex algorithms to learn from readers’ viewing habits and provide people with what they want to know before they know they want it.



Quote for the day:

"If you're not occasionally failing, you're not trying hard enough" -- Arthur Sulzberger Jr

January 04, 2014

Agile development practices: Three predictions for 2014
It's no secret that Agile development practices have taken the software industry by storm.Application lifecycle management, or ALM, vendors continue to come out with products and tools that help development teams embrace collaboration and continuously improve. Looking to 2014, I predict Agile will mature in three primary ways: More "custom" Agile processes; Growth of large-scale Agile; and Continued growth of DevOps


Human Technology Interfaces - What The Future Has In Store
Gadgets like Brain Link are already in the market, which coupled with related applications on smartphones gives beneficial gaming experience like attention training, meditation, neuro-social gaming, research and knowledge about brain. Most of us would have watched the movies 'Surrogates' wherein humans would stay indoors while their surrogates would go out to work and 'Minority Report' where the police and justice department would get alerts the moment some one think of committing a crime.


This Credit Card Startup Has A Way To Thwart Target-Style Hacking
“The root cause of fraud is the exposure of this information,” says William Gomez Jr., the co-founder and CEO. “The Epic One card does not hold any details of any credit cards. Neither does the Epic One application that runs on your smartphone. None of these devices hold any of your credit card information. The Epic One card grants you temporary access to your cloud wallet that is stored within Epic One’s back-end systems.”


Five Data Mining Techniques That Help Create Business Value
When developing your big data strategy it is important to have a clear understanding of what data mining is and how it can help you. The term data mining first appeared in the 1990s while before that, statisticians used the terms “Data Fishing” or “Data Dredging” to refer to analysing data without an a-priori hypothesis. The most important objective of any data mining process is to find useful information that is easily understood in large data sets. There are a few important classes of tasks that are involved with data mining:


17 exploits the NSA uses to hack PCs, routers and servers for surveillance
Some of the exploits are deployed remotely and others are physically installed. Those hands-on operations may occur while the product is being shipped; it could be snagged during shipping so an obscure group like an FBI black bag team can do the NSA’s domestic dirty work. There are too many exploits listed in the leak to cover in one post, but I thought you might like to know about some that target servers, routers and PCs.


Software requirements: Why the term 'nonfunctional requirements' misleads
You don't just need a bunch of usability. Usability is not nonfunctional. Usability is only relevant with respect to functionality. Moreover, usability requirements frequently differ from one function/use to another, and the differences are defined in terms of relevant characteristics, not some sizing unit as the single-entry-per-type approach implies. Consequently, when gathering data to discover requirements, inquiries about various functions each need also to address applicable nonfunctional characteristics, of which there may be many.


What to expect of Internet of Things in 2014
“Right now, if you think about it, the Internet of Things in your household will probably require you to go and re-purchase many devices that you have today, and I’m not sure how many of us can take that hit in one calendar year,” Robert Stroud, a member of ISACA’s Strategic Advisory council and vice president of innovation and strategy at CA Technologies, says. “I actually think it might apply more in commercial ventures first.”


Durandal: Quick Start
With RequireJS as its base and a thin layer of conventions, Durandal can provide amazing productivity while helping you to maintain SOLID coding practices. Pair that with out-of-the-box support for rich UI composition, modal dialogs, eventing/messaging, widgets, transitions, routing and more....and there's no doubt you'll be able to build whatever apps you can imagine. While Durandal has only been publicly available for about a year now, the community has grown at a breakneck pace.


3 Key Risk Management Trends for 2014
In a recent interaction with a leading banking and financial services organization, MetricStream (my employer) discussed how risk and compliance scores were being used to drive vendor negotiations when renewals arose. At another institution, risk and governance metrics directly impact the performance-linked financial incentives taken home by the management circle. This shift toward leveraging risk metrics as it pertains to performance metrics and business critical processes has elevated risk intelligence from a nice piece to a "must have."


Enterprise Architecture: Getting Organized For The New Year
“The architecture describes primarily the current system/enterprise,” Grigoriu writes. “It may also describe the target system/enterprise in order to visualise its end state. The architecture is employed in the process of enterprise transformation to ensure that projects are aligned in an enterprise-wide portfolio covering all enterprise entities, the business and technology issues and their dependencies.” What a concept – knowing how changing a system will affect other parts of the system before it happens. In this regard, EA is the antithesis of spaghetti – whether it’s spaghetti code, spaghetti cabling, or something else.



Quote for the day:

"The only way to discover the limits of the possible is to venture a little past them … into the impossible." -- Arthur C. Clarke

July 18, 2012

The impact of software complexity on cost and quality across project type –An aggregation of empirical evidences
Although manystudies investigate the relationship between designcomplexity and cost and quality, it is unclear what wehave learned from these studies, because no systematicsynthesis exists to date. This paper presented asystematic review on the influence of softwarecomplexity metrics on quality attributes.

From Annoyance to Harmonizer: Cloud Computing's Maturity Curve
What happens in many cases is new silos are created, and IT managers have difficulties bringing these applications and data together. Data integration is a problem cited by 67%, and 39% have issues in locating where the data may reside.

Chip and PIN, contactless coming for EFTPOS
Chip and PIN and contactless payment options are on their way for EFTPOS, with the company in the process of revamping its technology

Customer discovery
The riskiest thing a company can do is make something no one wants. So “get outside the building.” It costs $0.

20 awesome office gadgets and must-haves
With these gadgets and must-haves, you'll have everyone in the office wondering how so much win could possibly come from one person! Be the awesome you want your office to be.

IRD goes it alone on enterprise architecture
A project is under way to develop a Government Enterprise Architecture for New Zealand (GEA-NZ), as part of the Directions and Priorities policy in government ICT

Mobile voice falls for the first time - but text is booming
The telecoms regulator has recorded the first-ever drop in mobile voice-call volumes, which it says is down to soaring use of SMS and social networking - especially among the younger crowd

zSpace: A Real Holographic Display Worthy Of Iron Man
... I spent about an hour playing with a system called zSpace, a new display by Infinite Z that makes these sorts of Iron Man interactions a reality. And while I walked into the meeting a skeptic, I walked out realizing that these holographic interfaces aren’t just the future; if you have $6,000 to purchase your own, they’re today...

Good Managers Lead Through a Team
"Manage your team" might seem clear and straightforward. Yet when we talk about it, we often find it's not an intuitive concept for many managers and for some it even cuts against the grain of what they think they should do as bosses.

How To Turn A Nasty Surprise Into The Next Disruptive Idea
... Most companies view surprises as things to be avoided. Even positive surprises like Canon’s are considered fortunate anomalies, far from being the cornerstone of any real strategy. ...


Quote for the day:

"Our greatest battles are that with our own minds." - Jameson Frank