SlideShare a Scribd company logo
1 of 29
Download to read offline
Measuring Tests Using COSMIC
2°International Conferen
IT Data collection, Analysis and Benchma
Tokyo (Japan) - October 22,
Thomas M. Fehlmann, Zü
Eberhard Kranich, Duisb
Testing ICT Services
in the Cloud
2IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Measuring Tests
Using COSMIC
Goals of the presentation
G1. Understand COSMIC measurements in testing
G2. Free software testing from lines of code (LoC)
G3. Measure and benchmark software testing
3IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
l 1981: Dr. Math. ETHZ
l 1991: Six Sigma for Software Black Belt
l 1999: Euro Project Office AG, Zürich
l 2001: Akao Price 2001 for original contributions to QFD
l 2003: SwissICT Expert for Software Metrics, ICTscope.ch
l 2004: Member of the Board QFD Institute Deutschland – QFD Architect
l 2007: CMMI for Software – Level 4 & 5
l 2011: Net Promoter® Certified Associate
l 2013: Vice-President ISBSG
Dr. Thomas Fehlmann
l 1981: Dr. Math. ETHZ
l 1991: Six Sigma for Software Black Belt
l 1999: Euro Project Office AG, Zürich
l 2001: Akao Price 2001 for original contributions to QFD
l 2003: SwissICT Expert for Software Metrics, ICTscope.ch
l 2004: Member of the Board QFD Institute Deutschland – QFD Architect
l 2007: CMMI for Software – Level 4 & 5
l 2011: Net Promoter® Certified Associate
l 2013: Vice-President ISBSG
4IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Eberhard Kranich
l Mathematics and Computer Science
l Emphasis on Mathematical Statistics
l Mathematical Optimization
l Theory of Polynomial Complexity of Algorithms
l Working at T-Systems International GmbH in Bonn, Germany
l Six Sigma Black Belt for Software Development
l Software Quality Assurance Manager
l Mathematics and Computer Science
l Emphasis on Mathematical Statistics
l Mathematical Optimization
l Theory of Polynomial Complexity of Algorithms
l Worked at T-Systems International GmbH in Bonn, Germany
l Six Sigma Black Belt for Software Development
l Software Quality Assurance Manager
5IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
What is a Defect?
l Defect = Behavior impacting expected or required functionality of software
è How many bugs?
è By counting the
size of defect repositories?
è By number of entries???
6IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Software Testing as a Game
l Tester sees selected sequences in the UML
sequence diagram
l Tester can “walk” the data movements when
planning or executing tests
è Functionality becomes visible to the agile team
è Defects impacting functionality become visible
to testers
Other
Application
Other
Application
Some
Device
8.// Move some data
9.// Move some data
10.// Move some data
11.// Move some data
Other
Device
7IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Functionality, Defect Size, and Defect Density
l What happens if data movements have
defects?
l Testers mark the data movement where a
defect has been detected
l Same Metric:
èè ISO/IEC 19761 COSMICISO/IEC 19761 COSMIC
Other
Application
Other
Application
Some
Device
8.// Move some data
Move some data
10.// Move some data
11.// Move some data
Other
Device
l Functional Size
è Number of Data Movements needed to implement all FUR
l Test Size
è Number of Data Movements executed in Tests
l Test Story
è Collection of Test Cases aiming at certain FURs
l Defect Count
è Number of Data Movements affected by some defect detected in a test story
8IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Defects Density Prediction?
Now he counts the defects!
And counts and adjusts test size
By ISO/IEC 19761 COSMICISO/IEC 19761 COSMIC
Other
Application
Other
Application
Some
Device
8.// Move some data
9.// Move some data
10.// Move some data
11.// Move some data
Other
Device
How does he knowHow does he know
that he foundthat he found
all the defects?all the defects?
9IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
ISO/IEC Standard 29119 on Software Testing
Published as ISO/IEC 29119 (2013-07)
International Standard
Defines the Test Process
Calls for suitable Test Measures
10IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
ISO/IEC Standard 29119 on Software Testing
Organisational Test Process
Test Management Processes
Static Test
Processes
Test Planning
Test Monitoring
& Control
Test Completion
Organisational Test
Documentation
Feedback on
Organisational Test
Documentation
Test Plan Updates
Test
Plan
Test
Completion
Report
Test
Measures
Dynamic Test
Processes
Test Plan,
Control
Directives
Test Management
Processes
Test Plan,
Test Completion Report,
Test Measures
Test
Measures
Test Plan,
Control
Directives
Test Plan,
Control
Directives
© Tafline Murnane and Stuart Reid from ISO/IEC JTC1/SC7 WG26 Software Testing
11IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
The SW Testing Qualifications Board
l ISTQB
è 295’000 Certificates
è Iqnite Conferences (Sydney 2013)
l Third after ITIL and PMI
l Importance of Testing grows
12IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
But it’s Even Worse…
l What is Defect Density?
è Defects per KDLOC?
l What is Test Coverage?
è Code lines executed by some test case?
13IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
SW Testing and SW Metrics
l Counting practices for defect counting are undocumented
è “Number of Defects Found” per Stages / with Tests / etc.
è How do you count “Number of Defects”?
l Is it simply the number of entries in a defect repository?
è How can you avoid double reporting?
è Or make sure two defects are reported twice and not in a single report?
l A successor to the “Defect Measurement Manual” published by UKSMA in October 2000 is
under review: “Defect Measurement and Analysis Handbook”
è By European cooperation
è Important enhancement for ISBSG’s Data Collection!
14IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
SW Testing and SW Metrics
l Counting practices for defect counting are undocumented
è “Number of Defects Found” per Stages / with Tests / etc.
è How do you count “Number of Defects”?
l Is it simply the number of entries in a defect repository?
è How can you avoid double reporting?
è Or make sure two defects are reported twice and not in a single report?
l A successor to the “Defect Measurement Manual” published by UKSMA in October 2000 is
under review: “Defect Measurement and Analysis Handbook”
è By European cooperation
è Important enhancement for ISBSG’s Data Collection!
ReviewComments
15IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Goal Profile
0.62
0.69
0.37
1) R001 Search Data
2) R002 Answer Questions
3) R003 Keep Data Safe
Functional User Requirements
A Simple Data Search Example
l Functional User
Requirements (FUR) describe
a very simple data search
l They meet Customer’s Needs
l And have a
Priority Profile
1 Entry (E) + 2 eXit (X) + 2 Read (R) + 1 Write (W) = 6 CFP
User DataData
1.// Search Criteria
Trigger
2.// Write Search
3.// Get Result
4.// Show Result
5.// Nothing Found
6.// Show Error Message
Customer's Needs Topics Attributes
Y.a Data Access y1 Access Data Always Reliable Frequently
y2 Repeatable Responses Responses identical Always
Y.b Data Integrity y3 Cannot impact data No Write allowed
Goal Profile derived fromGoal Profile derived from
Voice of the CustomerVoice of the Customer
16IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
The Following SW Tests look Appropriate:
l Test Stories (scenarios) have
è Many Test Cases
è Each Test Case has
• Test Data
• Known Expected Response
l Test Size and Test Profiles can be measured
è by Functionality Covered
Test Story
CT-A Prepare CT-A.1 Retrieve Previous Responses
CT-A.2 Detect Missing Data
CT-A.3 Data Stays Untouched
Priority
TestSize
FALSE
Measured Defect Profile
0.43 11
0.74 18
0.51 12
41
Show Defects
17IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Execute Test Case CT-A.1.1
Entering valid search string
è Returns expected response
è Test Size is 4 CFP
Test Story No. 1
Functional User Requirements
CT-A.1 Retrieve Previous Responses R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP
CT-A.1.1 Enter valid Search String X001,R001,W001,E001 X001,E001 R001,W001 Return (known) Answer 8
CT-A.1.2 Enter invalid Search String E001 R002,W001 Invalid Search String 3
Test Story Contribution (CFP): 5 2 4 Test Size 11
Test Case Measurements
for Test Story CT-A.1
1 Entry (E) + 2 eXit (X) + 2 Read (R) + 1 Write (W) = 6 CFP
User DataData
1.// Search Criteria
Trigger
2.// Write Search
3.// Get Result
4.// Show Result
5.// Nothing Found
6.// Show Error Message
18IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Total Test Size
Total Test Size is 11 + 18 + 12 = 41 CFP
è Compares to Functional Size of 6 CFP
è Yields a Test Intensity of 41/6 = 6.8
è On average, < 7 tests per data movement
Test Story No. 1
Functional User Requirements
CT-A.1 Retrieve Previous Responses R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP
CT-A.1.1 Enter valid Search String X001,R001,W001,E001 X001,E001 R001,W001 Return (known) Answer 8
CT-A.1.2 Enter invalid Search String E001 R002,W001 Invalid Search String 3
Test Story Contribution (CFP): 5 2 4 Test Size 11
Test Case Measurements
for Test Story CT-A.1
CT-A.2 Detect Missing Data R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP
CT-A.2.1 Enter valid Search String for No Data X002,R002,W001,E001 X001,R001,W001,E001 R002,W001 No Data Available 10
CT-A.2.2 Enter invalid Search String R001,W001,X002,E001 X002,E001 R002,W001 Invalid Search String 8
Test Story Contribution (CFP): 8 6 4 Test Size 18
CT-A.3 Data Stays Untouched R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP
CT-A.3.1 Enter valid Search String W001,E001 X001,R001 R001,W001 Return identical Answer 6
CT-A.3.2 Enter invalid Search String X002,E001 Invalid Search String 2
CT-A.3.3 Enter Same String Again R001,W001,X001,E001 Return identical Answer 4
Test Story Contribution (CFP): 2 8 2 Test Size 12
Test Size in CFP: 41
Test Intensity in CFP: 6.8
Test Coverage: 100%
19IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Recording a Defect
Test Story No. 2
Functional User Requirements
CT-A.2 Detect Missing Data R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP
CT-A.2.1 Enter valid Search String for No Data X002,R002,W001,E001 X001,R001,W001,E001 R002,W001 No Data Available 10
CT-A.2.2 Enter invalid Search String R001,W001,X002,E001 X002,E001 R002,W001 Invalid Search String 8
Test Story Contribution (CFP): 8 6 4 Test Size 18
Test Case Measurements
for Test Story CT-A.2
l “Bug” in 6.// Show Error Message
è Detected with data base containing no data
è Test Size is 4 CFP
è 1 Defect1 Defect1 Defect1 Defect found!
1 Entry (E) + 2 eXit (X) + 2 Read (R) + 1 Write (W) = 6 CFP
User DataData
1.// Search Criteria
Trigger
2.// Write Search
3.// Get Result
4.// Show Result
5.// Nothing Found
6.// Show Error Message
20IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Defect Observed
One Defect Found
è Possibly observable in all tests touching the data movement 6.// Show Error Message – named X002
è Counted once
Name Label Description Name Label
#001 Escape Chars Some characters such as 'ä' are wrongly interpreted as escape characetrs in strings R001 GetResult
1
Defects Observed Data Movements Affected
Defect Count
Test Story No. 2
Functional User Requirements
CT-A.2 Detect Missing Data R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP
CT-A.2.1 Enter valid Search String for No Data X002,R002,W001,E001 X001,R001,W001,E001 R002,W001 No Data Available 10
CT-A.2.2 Enter invalid Search String R001,W001,X002,E001 X002,E001 R002,W001 Invalid Search String 8
Test Story Contribution (CFP): 8 6 4 Test Size 18
Test Case Measurements
for Test Story CT-A.2
21IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Test Status Reporting
l Test Status Characterization
è Test Size is the total number of data movements executed in all Test Cases of all test stories
è One Data Movement can have only one defect identified per Test Story
l However, one misbehavior found might affect more than one data movement and thus
count for more than one defect
Test Status Summary
Total CFP: 6
Defects Pending for Removal: 2 Test Size in CFP: 41
Defects Found in Total: 2 Test Intensity in CFP: 6.8
Defect Density: 33% Test Coverage: 100%
22IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Caveat
l Test size increases with meaningless test cases added to the test stories – little variations
of test data with almost identical expected responses might spoil measurements!
è We need a metric indicating that our test strategy is appropriate
23IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
What is Six Sigma Testing?
24IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
What is Lean Six Sigma Testing?
Replace manyReplace many
Test StoriesTest Stories……
… by those
needed for the
Eigensolution
…… go for thego for the
Eigenvector!Eigenvector!
25IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Calculating the Eigenvector with Jacobi Iterative
AAAAT
x
26IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Calculating the Eigenvector with Jacobi Iterative
AAAAT
x9999 0 3 0
0 9999 0 8888
1 0 5 3
9999 0
0 9999
3 0
0 8888
90 0 24
0 145 24
24 24 35
27IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Test Stories
GoalTestCoverage
RetrievePreviousResponses
DetectMissingData
DataStaysUntouched
AchievedCoverage
CT-A.1
CT-A.2
CT-A.3
R001 Search Data 0.62 5 8888 2 0.64
R002 Answer Questions 0.69 2 6 8888 0.66
R003 Keep Data Safe 0.37 4 4 2 0.40
Ideal Profile for Test Stories 0.43 0.74 0.51 Convergence Gap
0.42 0.7 0.5 0.04
0.10 Convergence Range
0.20 Convergence Limit
Test Stories
Deployment Combinator
Functional User Requirements
Measuring Test Coverage with Eigensolution
Number ofNumber of
data movementsdata movements
executedexecuted
28IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Lean & Six Sigma for Software Testing
Six Sigma
è Design of Experiments
è Multi-linear Regression
for Root Cause Analysis
and process control
l Lean
è Detect Waste (muda, 無駄
)
è Test-Driven Development
è Defect-free delivery
ll Lean Six SigmaLean Six SigmaLean Six SigmaLean Six SigmaLean Six SigmaLean Six SigmaLean Six SigmaLean Six Sigma
è Predict Waste (muda, 無駄)
è Eigenvectors solutionsEigenvectors solutionsEigenvectors solutionsEigenvectors solutions for Root
Cause Analysis and process control
è Predict Defect DensityDefect DensityDefect DensityDefect Density
è Q Control ChartsQ Control ChartsQ Control ChartsQ Control Charts for SW Testing
29IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com
Questions?

More Related Content

What's hot

Testing, fixing, and proving with contracts
Testing, fixing, and proving with contractsTesting, fixing, and proving with contracts
Testing, fixing, and proving with contractsCarlo A. Furia
 
Software testing lab manual
Software testing lab manualSoftware testing lab manual
Software testing lab manualTanzeem Syed
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect PredictionSung Kim
 
Software testing: an introduction - 2017
Software testing: an introduction - 2017Software testing: an introduction - 2017
Software testing: an introduction - 2017XavierDevroey
 
An overview of automated test suites and defect density in Android
An overview of automated test suites and defect density in AndroidAn overview of automated test suites and defect density in Android
An overview of automated test suites and defect density in AndroidVahid Garousi
 
Cross-project defect prediction
Cross-project defect predictionCross-project defect prediction
Cross-project defect predictionThomas Zimmermann
 
Impact Analysis of Granularity Levels on Feature Location Technique
Impact Analysis of Granularity Levels on Feature Location TechniqueImpact Analysis of Granularity Levels on Feature Location Technique
Impact Analysis of Granularity Levels on Feature Location TechniqueChakkrit (Kla) Tantithamthavorn
 
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Feng Zhang
 
Software Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled DatasetsSoftware Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled DatasetsSung Kim
 
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...Lionel Briand
 
Static analysis works for mission-critical systems, why not yours?
Static analysis works for mission-critical systems, why not yours? Static analysis works for mission-critical systems, why not yours?
Static analysis works for mission-critical systems, why not yours? Rogue Wave Software
 
Achieve iso 26262 certification
Achieve iso 26262 certificationAchieve iso 26262 certification
Achieve iso 26262 certificationPRQA
 
Revisiting Code Ownership and Its Relationship with Software Quality in the S...
Revisiting Code Ownership and Its Relationship with Software Quality in the S...Revisiting Code Ownership and Its Relationship with Software Quality in the S...
Revisiting Code Ownership and Its Relationship with Software Quality in the S...The University of Adelaide
 
STAR: Stack Trace based Automatic Crash Reproduction
STAR: Stack Trace based Automatic Crash ReproductionSTAR: Stack Trace based Automatic Crash Reproduction
STAR: Stack Trace based Automatic Crash ReproductionSung Kim
 
AN AUTOMATED APPROACH TO ASSIGN SOFTWARE CHANGE REQUESTS (Ph.D. Presentation)
AN AUTOMATED APPROACH TO ASSIGN SOFTWARE CHANGE REQUESTS (Ph.D. Presentation)AN AUTOMATED APPROACH TO ASSIGN SOFTWARE CHANGE REQUESTS (Ph.D. Presentation)
AN AUTOMATED APPROACH TO ASSIGN SOFTWARE CHANGE REQUESTS (Ph.D. Presentation)yguarata
 
Chapter 8 software testing
Chapter 8 software testingChapter 8 software testing
Chapter 8 software testingdespicable me
 

What's hot (20)

Testing, fixing, and proving with contracts
Testing, fixing, and proving with contractsTesting, fixing, and proving with contracts
Testing, fixing, and proving with contracts
 
Software testing lab manual
Software testing lab manualSoftware testing lab manual
Software testing lab manual
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect Prediction
 
Software testing: an introduction - 2017
Software testing: an introduction - 2017Software testing: an introduction - 2017
Software testing: an introduction - 2017
 
An overview of automated test suites and defect density in Android
An overview of automated test suites and defect density in AndroidAn overview of automated test suites and defect density in Android
An overview of automated test suites and defect density in Android
 
Wa
WaWa
Wa
 
Cross-project defect prediction
Cross-project defect predictionCross-project defect prediction
Cross-project defect prediction
 
Impact Analysis of Granularity Levels on Feature Location Technique
Impact Analysis of Granularity Levels on Feature Location TechniqueImpact Analysis of Granularity Levels on Feature Location Technique
Impact Analysis of Granularity Levels on Feature Location Technique
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
 
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
Cross-project Defect Prediction Using A Connectivity-based Unsupervised Class...
 
Software Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled DatasetsSoftware Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled Datasets
 
Who Should Review My Code?
Who Should Review My Code?  Who Should Review My Code?
Who Should Review My Code?
 
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
 
Static analysis works for mission-critical systems, why not yours?
Static analysis works for mission-critical systems, why not yours? Static analysis works for mission-critical systems, why not yours?
Static analysis works for mission-critical systems, why not yours?
 
Achieve iso 26262 certification
Achieve iso 26262 certificationAchieve iso 26262 certification
Achieve iso 26262 certification
 
Revisiting Code Ownership and Its Relationship with Software Quality in the S...
Revisiting Code Ownership and Its Relationship with Software Quality in the S...Revisiting Code Ownership and Its Relationship with Software Quality in the S...
Revisiting Code Ownership and Its Relationship with Software Quality in the S...
 
STAR: Stack Trace based Automatic Crash Reproduction
STAR: Stack Trace based Automatic Crash ReproductionSTAR: Stack Trace based Automatic Crash Reproduction
STAR: Stack Trace based Automatic Crash Reproduction
 
AN AUTOMATED APPROACH TO ASSIGN SOFTWARE CHANGE REQUESTS (Ph.D. Presentation)
AN AUTOMATED APPROACH TO ASSIGN SOFTWARE CHANGE REQUESTS (Ph.D. Presentation)AN AUTOMATED APPROACH TO ASSIGN SOFTWARE CHANGE REQUESTS (Ph.D. Presentation)
AN AUTOMATED APPROACH TO ASSIGN SOFTWARE CHANGE REQUESTS (Ph.D. Presentation)
 
Chapter 8 software testing
Chapter 8 software testingChapter 8 software testing
Chapter 8 software testing
 
Spoorthy_Resume
Spoorthy_ResumeSpoorthy_Resume
Spoorthy_Resume
 

Viewers also liked

Driving growth in Indian manufacturing industry
Driving  growth in Indian manufacturing industry  Driving  growth in Indian manufacturing industry
Driving growth in Indian manufacturing industry Sumit Roy
 
Deloitte Technology Media and Telecommunications Predictions 2016
Deloitte Technology Media and Telecommunications Predictions 2016Deloitte Technology Media and Telecommunications Predictions 2016
Deloitte Technology Media and Telecommunications Predictions 2016David Graham
 
The True Cost of Open Source Software: Uncovering Hidden Costs and Maximizing...
The True Cost of Open Source Software: Uncovering Hidden Costs and Maximizing...The True Cost of Open Source Software: Uncovering Hidden Costs and Maximizing...
The True Cost of Open Source Software: Uncovering Hidden Costs and Maximizing...ActiveState
 
The Value of Infrastructure Asset Management
The Value of Infrastructure Asset ManagementThe Value of Infrastructure Asset Management
The Value of Infrastructure Asset ManagementC.S. Davidson
 
How to Scale your Analytics in a Maturing Organization
How to Scale your Analytics in a Maturing OrganizationHow to Scale your Analytics in a Maturing Organization
How to Scale your Analytics in a Maturing OrganizationKissmetrics on SlideShare
 
CTO Summit 2016: Navigating Build vs. Buy at CleverTap
CTO Summit 2016: Navigating Build vs. Buy at CleverTapCTO Summit 2016: Navigating Build vs. Buy at CleverTap
CTO Summit 2016: Navigating Build vs. Buy at CleverTapCleverTap
 
Measuring the value of your KM strategy
Measuring the value of your KM strategyMeasuring the value of your KM strategy
Measuring the value of your KM strategyChris Fletcher
 
Developing Metrics that Demonstrate the Value of Technical Communications
Developing Metrics that Demonstrate the Value of Technical CommunicationsDeveloping Metrics that Demonstrate the Value of Technical Communications
Developing Metrics that Demonstrate the Value of Technical CommunicationsVic Passion
 
Caught in a COTS Project - Strategies for Requirements Success 2011MAY17
Caught in a COTS Project - Strategies for Requirements Success 2011MAY17Caught in a COTS Project - Strategies for Requirements Success 2011MAY17
Caught in a COTS Project - Strategies for Requirements Success 2011MAY17Michael Roy
 
INPACT 2: How to avoid a failed project - Slidecast 2: Organisation’s capability
INPACT 2: How to avoid a failed project - Slidecast 2: Organisation’s capabilityINPACT 2: How to avoid a failed project - Slidecast 2: Organisation’s capability
INPACT 2: How to avoid a failed project - Slidecast 2: Organisation’s capabilityThe Imaginist Company
 
The future of software pricing excellence transaction pricing management
The future of software pricing excellence transaction pricing managementThe future of software pricing excellence transaction pricing management
The future of software pricing excellence transaction pricing managementVishal Sharma
 
Increasing the Business Value of Communications: Innovation, Strategy and Trust
Increasing the Business Value of Communications: Innovation, Strategy and TrustIncreasing the Business Value of Communications: Innovation, Strategy and Trust
Increasing the Business Value of Communications: Innovation, Strategy and TrustJeff Zwier
 

Viewers also liked (20)

Driving growth in Indian manufacturing industry
Driving  growth in Indian manufacturing industry  Driving  growth in Indian manufacturing industry
Driving growth in Indian manufacturing industry
 
R.D.Fernandez et al - Software rates vs price of function points
R.D.Fernandez et al  - Software rates vs price of function pointsR.D.Fernandez et al  - Software rates vs price of function points
R.D.Fernandez et al - Software rates vs price of function points
 
Deloitte Technology Media and Telecommunications Predictions 2016
Deloitte Technology Media and Telecommunications Predictions 2016Deloitte Technology Media and Telecommunications Predictions 2016
Deloitte Technology Media and Telecommunications Predictions 2016
 
Galorath - IT Data Collection, Analysis and Benchmarking: From Processes and...
Galorath -  IT Data Collection, Analysis and Benchmarking: From Processes and...Galorath -  IT Data Collection, Analysis and Benchmarking: From Processes and...
Galorath - IT Data Collection, Analysis and Benchmarking: From Processes and...
 
The True Cost of Open Source Software: Uncovering Hidden Costs and Maximizing...
The True Cost of Open Source Software: Uncovering Hidden Costs and Maximizing...The True Cost of Open Source Software: Uncovering Hidden Costs and Maximizing...
The True Cost of Open Source Software: Uncovering Hidden Costs and Maximizing...
 
Ogilvie - Beyond the statistical average
Ogilvie  - Beyond the statistical averageOgilvie  - Beyond the statistical average
Ogilvie - Beyond the statistical average
 
The Value of Infrastructure Asset Management
The Value of Infrastructure Asset ManagementThe Value of Infrastructure Asset Management
The Value of Infrastructure Asset Management
 
How to Scale your Analytics in a Maturing Organization
How to Scale your Analytics in a Maturing OrganizationHow to Scale your Analytics in a Maturing Organization
How to Scale your Analytics in a Maturing Organization
 
Forselius - New look at project management triangle
Forselius - New look at project management triangleForselius - New look at project management triangle
Forselius - New look at project management triangle
 
CTO Summit 2016: Navigating Build vs. Buy at CleverTap
CTO Summit 2016: Navigating Build vs. Buy at CleverTapCTO Summit 2016: Navigating Build vs. Buy at CleverTap
CTO Summit 2016: Navigating Build vs. Buy at CleverTap
 
Measuring the value of your KM strategy
Measuring the value of your KM strategyMeasuring the value of your KM strategy
Measuring the value of your KM strategy
 
Developing Metrics that Demonstrate the Value of Technical Communications
Developing Metrics that Demonstrate the Value of Technical CommunicationsDeveloping Metrics that Demonstrate the Value of Technical Communications
Developing Metrics that Demonstrate the Value of Technical Communications
 
Green - sizing for estimating, measurement and benchmarking
Green - sizing for estimating, measurement and benchmarkingGreen - sizing for estimating, measurement and benchmarking
Green - sizing for estimating, measurement and benchmarking
 
Caught in a COTS Project - Strategies for Requirements Success 2011MAY17
Caught in a COTS Project - Strategies for Requirements Success 2011MAY17Caught in a COTS Project - Strategies for Requirements Success 2011MAY17
Caught in a COTS Project - Strategies for Requirements Success 2011MAY17
 
INPACT 2: How to avoid a failed project - Slidecast 2: Organisation’s capability
INPACT 2: How to avoid a failed project - Slidecast 2: Organisation’s capabilityINPACT 2: How to avoid a failed project - Slidecast 2: Organisation’s capability
INPACT 2: How to avoid a failed project - Slidecast 2: Organisation’s capability
 
Org Design
Org DesignOrg Design
Org Design
 
Maximizing ROI In Product Development
Maximizing ROI In Product DevelopmentMaximizing ROI In Product Development
Maximizing ROI In Product Development
 
The future of software pricing excellence transaction pricing management
The future of software pricing excellence transaction pricing managementThe future of software pricing excellence transaction pricing management
The future of software pricing excellence transaction pricing management
 
Increasing the Business Value of Communications: Innovation, Strategy and Trust
Increasing the Business Value of Communications: Innovation, Strategy and TrustIncreasing the Business Value of Communications: Innovation, Strategy and Trust
Increasing the Business Value of Communications: Innovation, Strategy and Trust
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
 

Similar to Fehlmann and Kranich - Measuring tests using cosmic

Simpda 2014 - A living story: measuring quality of developments in a large in...
Simpda 2014 - A living story: measuring quality of developments in a large in...Simpda 2014 - A living story: measuring quality of developments in a large in...
Simpda 2014 - A living story: measuring quality of developments in a large in...SpagoWorld
 
Semi-Automated Security Testing of Web applications
Semi-Automated Security Testing of Web applicationsSemi-Automated Security Testing of Web applications
Semi-Automated Security Testing of Web applicationsRam G Athreya
 
Data Science at Roche: From Exploration to Productionization - Frank Block
Data Science at Roche: From Exploration to Productionization - Frank BlockData Science at Roche: From Exploration to Productionization - Frank Block
Data Science at Roche: From Exploration to Productionization - Frank BlockRising Media Ltd.
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedAshley Zupkus
 
Iwsm2014 measuring the software size of sliced v-model projects (andreas de...
Iwsm2014   measuring the software size of sliced v-model projects (andreas de...Iwsm2014   measuring the software size of sliced v-model projects (andreas de...
Iwsm2014 measuring the software size of sliced v-model projects (andreas de...Nesma
 
Fundamentals of Testing
Fundamentals of TestingFundamentals of Testing
Fundamentals of TestingCode95
 
Dan Lewis 2014
Dan Lewis 2014Dan Lewis 2014
Dan Lewis 2014Dan Lewis
 
Iwsm2014 defect density measurements using cosmic (thomas fehlmann)
Iwsm2014   defect density measurements using cosmic (thomas fehlmann)Iwsm2014   defect density measurements using cosmic (thomas fehlmann)
Iwsm2014 defect density measurements using cosmic (thomas fehlmann)Nesma
 
From Sage 500 to 1000 ... Performance Testing myths exposed
From Sage 500 to 1000 ... Performance Testing myths exposedFrom Sage 500 to 1000 ... Performance Testing myths exposed
From Sage 500 to 1000 ... Performance Testing myths exposedTrust IV Ltd
 
Presentazione SCOPE by flyby
Presentazione SCOPE by flyby Presentazione SCOPE by flyby
Presentazione SCOPE by flyby SLOPE Project
 
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOps
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOpsDevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOps
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOpsSailaja Tennati
 
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...IRJET Journal
 
Lect1 fault+quality
Lect1 fault+qualityLect1 fault+quality
Lect1 fault+qualitybabak sh
 
Ragha Deepika_Exp_4+
Ragha Deepika_Exp_4+Ragha Deepika_Exp_4+
Ragha Deepika_Exp_4+Ragha batchu
 

Similar to Fehlmann and Kranich - Measuring tests using cosmic (20)

Furuyama - analysis of factors that affect productivity
Furuyama - analysis of factors that affect productivityFuruyama - analysis of factors that affect productivity
Furuyama - analysis of factors that affect productivity
 
Iwsm2014 defect density measurements using cosmic (thomas fehlmann)
Iwsm2014   defect density measurements using cosmic (thomas fehlmann)Iwsm2014   defect density measurements using cosmic (thomas fehlmann)
Iwsm2014 defect density measurements using cosmic (thomas fehlmann)
 
Simpda 2014 - A living story: measuring quality of developments in a large in...
Simpda 2014 - A living story: measuring quality of developments in a large in...Simpda 2014 - A living story: measuring quality of developments in a large in...
Simpda 2014 - A living story: measuring quality of developments in a large in...
 
Agilent Technologies Demo
Agilent Technologies DemoAgilent Technologies Demo
Agilent Technologies Demo
 
Semi-Automated Security Testing of Web applications
Semi-Automated Security Testing of Web applicationsSemi-Automated Security Testing of Web applications
Semi-Automated Security Testing of Web applications
 
Data Science at Roche: From Exploration to Productionization - Frank Block
Data Science at Roche: From Exploration to Productionization - Frank BlockData Science at Roche: From Exploration to Productionization - Frank Block
Data Science at Roche: From Exploration to Productionization - Frank Block
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically Guaranteed
 
Iwsm2014 measuring the software size of sliced v-model projects (andreas de...
Iwsm2014   measuring the software size of sliced v-model projects (andreas de...Iwsm2014   measuring the software size of sliced v-model projects (andreas de...
Iwsm2014 measuring the software size of sliced v-model projects (andreas de...
 
Updated resume
Updated resumeUpdated resume
Updated resume
 
IV&amp;V Cox Overview
IV&amp;V Cox OverviewIV&amp;V Cox Overview
IV&amp;V Cox Overview
 
Fundamentals of Testing
Fundamentals of TestingFundamentals of Testing
Fundamentals of Testing
 
Sharanabasappa_Resume
Sharanabasappa_Resume Sharanabasappa_Resume
Sharanabasappa_Resume
 
Dan Lewis 2014
Dan Lewis 2014Dan Lewis 2014
Dan Lewis 2014
 
Iwsm2014 defect density measurements using cosmic (thomas fehlmann)
Iwsm2014   defect density measurements using cosmic (thomas fehlmann)Iwsm2014   defect density measurements using cosmic (thomas fehlmann)
Iwsm2014 defect density measurements using cosmic (thomas fehlmann)
 
From Sage 500 to 1000 ... Performance Testing myths exposed
From Sage 500 to 1000 ... Performance Testing myths exposedFrom Sage 500 to 1000 ... Performance Testing myths exposed
From Sage 500 to 1000 ... Performance Testing myths exposed
 
Presentazione SCOPE by flyby
Presentazione SCOPE by flyby Presentazione SCOPE by flyby
Presentazione SCOPE by flyby
 
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOps
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOpsDevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOps
DevOps Summit 2015 Presentation: Continuous Testing At the Speed of DevOps
 
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...
 
Lect1 fault+quality
Lect1 fault+qualityLect1 fault+quality
Lect1 fault+quality
 
Ragha Deepika_Exp_4+
Ragha Deepika_Exp_4+Ragha Deepika_Exp_4+
Ragha Deepika_Exp_4+
 

More from International Software Benchmarking Standards Group (ISBSG)

More from International Software Benchmarking Standards Group (ISBSG) (9)

Galorath - Why can't people estimate
Galorath - Why can't people estimateGalorath - Why can't people estimate
Galorath - Why can't people estimate
 
Hill - Are we really bad? A look at software estimation accuracy
Hill - Are we really bad? A look at software estimation accuracyHill - Are we really bad? A look at software estimation accuracy
Hill - Are we really bad? A look at software estimation accuracy
 
Minkiewicz - Lessons Learned from the ISBSG Database
Minkiewicz - Lessons Learned from the ISBSG DatabaseMinkiewicz - Lessons Learned from the ISBSG Database
Minkiewicz - Lessons Learned from the ISBSG Database
 
Bertazo et al - Application Lifecycle Management and process monitoring throu...
Bertazo et al - Application Lifecycle Management and process monitoring throu...Bertazo et al - Application Lifecycle Management and process monitoring throu...
Bertazo et al - Application Lifecycle Management and process monitoring throu...
 
Silveira - KPIs used in a 6,000 Function Points Program
Silveira - KPIs used in a 6,000 Function Points ProgramSilveira - KPIs used in a 6,000 Function Points Program
Silveira - KPIs used in a 6,000 Function Points Program
 
Schofield - Using Benchmarks to Accelerate Process Improvement
Schofield - Using Benchmarks to Accelerate Process ImprovementSchofield - Using Benchmarks to Accelerate Process Improvement
Schofield - Using Benchmarks to Accelerate Process Improvement
 
Dekkers, T. - Software Estimation – The next level
Dekkers, T. - Software Estimation – The next levelDekkers, T. - Software Estimation – The next level
Dekkers, T. - Software Estimation – The next level
 
De la fuente and Castelo - Software Rates vs cost per Function Point: a cost ...
De la fuente and Castelo - Software Rates vs cost per Function Point: a cost ...De la fuente and Castelo - Software Rates vs cost per Function Point: a cost ...
De la fuente and Castelo - Software Rates vs cost per Function Point: a cost ...
 
S Woodward - What is your quest for software analytics
S Woodward - What is your quest for software analyticsS Woodward - What is your quest for software analytics
S Woodward - What is your quest for software analytics
 

Recently uploaded

Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxRich Reba
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHelp Desk Migration
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 

Recently uploaded (20)

Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptx
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Authentically Social - presented by Corey Perlman
Authentically Social - presented by Corey PerlmanAuthentically Social - presented by Corey Perlman
Authentically Social - presented by Corey Perlman
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your Business
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 

Fehlmann and Kranich - Measuring tests using cosmic

  • 1. Measuring Tests Using COSMIC 2°International Conferen IT Data collection, Analysis and Benchma Tokyo (Japan) - October 22, Thomas M. Fehlmann, Zü Eberhard Kranich, Duisb Testing ICT Services in the Cloud
  • 2. 2IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Measuring Tests Using COSMIC Goals of the presentation G1. Understand COSMIC measurements in testing G2. Free software testing from lines of code (LoC) G3. Measure and benchmark software testing
  • 3. 3IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com l 1981: Dr. Math. ETHZ l 1991: Six Sigma for Software Black Belt l 1999: Euro Project Office AG, Zürich l 2001: Akao Price 2001 for original contributions to QFD l 2003: SwissICT Expert for Software Metrics, ICTscope.ch l 2004: Member of the Board QFD Institute Deutschland – QFD Architect l 2007: CMMI for Software – Level 4 & 5 l 2011: Net Promoter® Certified Associate l 2013: Vice-President ISBSG Dr. Thomas Fehlmann l 1981: Dr. Math. ETHZ l 1991: Six Sigma for Software Black Belt l 1999: Euro Project Office AG, Zürich l 2001: Akao Price 2001 for original contributions to QFD l 2003: SwissICT Expert for Software Metrics, ICTscope.ch l 2004: Member of the Board QFD Institute Deutschland – QFD Architect l 2007: CMMI for Software – Level 4 & 5 l 2011: Net Promoter® Certified Associate l 2013: Vice-President ISBSG
  • 4. 4IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Eberhard Kranich l Mathematics and Computer Science l Emphasis on Mathematical Statistics l Mathematical Optimization l Theory of Polynomial Complexity of Algorithms l Working at T-Systems International GmbH in Bonn, Germany l Six Sigma Black Belt for Software Development l Software Quality Assurance Manager l Mathematics and Computer Science l Emphasis on Mathematical Statistics l Mathematical Optimization l Theory of Polynomial Complexity of Algorithms l Worked at T-Systems International GmbH in Bonn, Germany l Six Sigma Black Belt for Software Development l Software Quality Assurance Manager
  • 5. 5IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com What is a Defect? l Defect = Behavior impacting expected or required functionality of software è How many bugs? è By counting the size of defect repositories? è By number of entries???
  • 6. 6IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Software Testing as a Game l Tester sees selected sequences in the UML sequence diagram l Tester can “walk” the data movements when planning or executing tests è Functionality becomes visible to the agile team è Defects impacting functionality become visible to testers Other Application Other Application Some Device 8.// Move some data 9.// Move some data 10.// Move some data 11.// Move some data Other Device
  • 7. 7IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Functionality, Defect Size, and Defect Density l What happens if data movements have defects? l Testers mark the data movement where a defect has been detected l Same Metric: èè ISO/IEC 19761 COSMICISO/IEC 19761 COSMIC Other Application Other Application Some Device 8.// Move some data Move some data 10.// Move some data 11.// Move some data Other Device l Functional Size è Number of Data Movements needed to implement all FUR l Test Size è Number of Data Movements executed in Tests l Test Story è Collection of Test Cases aiming at certain FURs l Defect Count è Number of Data Movements affected by some defect detected in a test story
  • 8. 8IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Defects Density Prediction? Now he counts the defects! And counts and adjusts test size By ISO/IEC 19761 COSMICISO/IEC 19761 COSMIC Other Application Other Application Some Device 8.// Move some data 9.// Move some data 10.// Move some data 11.// Move some data Other Device How does he knowHow does he know that he foundthat he found all the defects?all the defects?
  • 9. 9IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com ISO/IEC Standard 29119 on Software Testing Published as ISO/IEC 29119 (2013-07) International Standard Defines the Test Process Calls for suitable Test Measures
  • 10. 10IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com ISO/IEC Standard 29119 on Software Testing Organisational Test Process Test Management Processes Static Test Processes Test Planning Test Monitoring & Control Test Completion Organisational Test Documentation Feedback on Organisational Test Documentation Test Plan Updates Test Plan Test Completion Report Test Measures Dynamic Test Processes Test Plan, Control Directives Test Management Processes Test Plan, Test Completion Report, Test Measures Test Measures Test Plan, Control Directives Test Plan, Control Directives © Tafline Murnane and Stuart Reid from ISO/IEC JTC1/SC7 WG26 Software Testing
  • 11. 11IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com The SW Testing Qualifications Board l ISTQB è 295’000 Certificates è Iqnite Conferences (Sydney 2013) l Third after ITIL and PMI l Importance of Testing grows
  • 12. 12IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com But it’s Even Worse… l What is Defect Density? è Defects per KDLOC? l What is Test Coverage? è Code lines executed by some test case?
  • 13. 13IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com SW Testing and SW Metrics l Counting practices for defect counting are undocumented è “Number of Defects Found” per Stages / with Tests / etc. è How do you count “Number of Defects”? l Is it simply the number of entries in a defect repository? è How can you avoid double reporting? è Or make sure two defects are reported twice and not in a single report? l A successor to the “Defect Measurement Manual” published by UKSMA in October 2000 is under review: “Defect Measurement and Analysis Handbook” è By European cooperation è Important enhancement for ISBSG’s Data Collection!
  • 14. 14IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com SW Testing and SW Metrics l Counting practices for defect counting are undocumented è “Number of Defects Found” per Stages / with Tests / etc. è How do you count “Number of Defects”? l Is it simply the number of entries in a defect repository? è How can you avoid double reporting? è Or make sure two defects are reported twice and not in a single report? l A successor to the “Defect Measurement Manual” published by UKSMA in October 2000 is under review: “Defect Measurement and Analysis Handbook” è By European cooperation è Important enhancement for ISBSG’s Data Collection! ReviewComments
  • 15. 15IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Goal Profile 0.62 0.69 0.37 1) R001 Search Data 2) R002 Answer Questions 3) R003 Keep Data Safe Functional User Requirements A Simple Data Search Example l Functional User Requirements (FUR) describe a very simple data search l They meet Customer’s Needs l And have a Priority Profile 1 Entry (E) + 2 eXit (X) + 2 Read (R) + 1 Write (W) = 6 CFP User DataData 1.// Search Criteria Trigger 2.// Write Search 3.// Get Result 4.// Show Result 5.// Nothing Found 6.// Show Error Message Customer's Needs Topics Attributes Y.a Data Access y1 Access Data Always Reliable Frequently y2 Repeatable Responses Responses identical Always Y.b Data Integrity y3 Cannot impact data No Write allowed Goal Profile derived fromGoal Profile derived from Voice of the CustomerVoice of the Customer
  • 16. 16IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com The Following SW Tests look Appropriate: l Test Stories (scenarios) have è Many Test Cases è Each Test Case has • Test Data • Known Expected Response l Test Size and Test Profiles can be measured è by Functionality Covered Test Story CT-A Prepare CT-A.1 Retrieve Previous Responses CT-A.2 Detect Missing Data CT-A.3 Data Stays Untouched Priority TestSize FALSE Measured Defect Profile 0.43 11 0.74 18 0.51 12 41 Show Defects
  • 17. 17IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Execute Test Case CT-A.1.1 Entering valid search string è Returns expected response è Test Size is 4 CFP Test Story No. 1 Functional User Requirements CT-A.1 Retrieve Previous Responses R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP CT-A.1.1 Enter valid Search String X001,R001,W001,E001 X001,E001 R001,W001 Return (known) Answer 8 CT-A.1.2 Enter invalid Search String E001 R002,W001 Invalid Search String 3 Test Story Contribution (CFP): 5 2 4 Test Size 11 Test Case Measurements for Test Story CT-A.1 1 Entry (E) + 2 eXit (X) + 2 Read (R) + 1 Write (W) = 6 CFP User DataData 1.// Search Criteria Trigger 2.// Write Search 3.// Get Result 4.// Show Result 5.// Nothing Found 6.// Show Error Message
  • 18. 18IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Total Test Size Total Test Size is 11 + 18 + 12 = 41 CFP è Compares to Functional Size of 6 CFP è Yields a Test Intensity of 41/6 = 6.8 è On average, < 7 tests per data movement Test Story No. 1 Functional User Requirements CT-A.1 Retrieve Previous Responses R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP CT-A.1.1 Enter valid Search String X001,R001,W001,E001 X001,E001 R001,W001 Return (known) Answer 8 CT-A.1.2 Enter invalid Search String E001 R002,W001 Invalid Search String 3 Test Story Contribution (CFP): 5 2 4 Test Size 11 Test Case Measurements for Test Story CT-A.1 CT-A.2 Detect Missing Data R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP CT-A.2.1 Enter valid Search String for No Data X002,R002,W001,E001 X001,R001,W001,E001 R002,W001 No Data Available 10 CT-A.2.2 Enter invalid Search String R001,W001,X002,E001 X002,E001 R002,W001 Invalid Search String 8 Test Story Contribution (CFP): 8 6 4 Test Size 18 CT-A.3 Data Stays Untouched R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP CT-A.3.1 Enter valid Search String W001,E001 X001,R001 R001,W001 Return identical Answer 6 CT-A.3.2 Enter invalid Search String X002,E001 Invalid Search String 2 CT-A.3.3 Enter Same String Again R001,W001,X001,E001 Return identical Answer 4 Test Story Contribution (CFP): 2 8 2 Test Size 12 Test Size in CFP: 41 Test Intensity in CFP: 6.8 Test Coverage: 100%
  • 19. 19IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Recording a Defect Test Story No. 2 Functional User Requirements CT-A.2 Detect Missing Data R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP CT-A.2.1 Enter valid Search String for No Data X002,R002,W001,E001 X001,R001,W001,E001 R002,W001 No Data Available 10 CT-A.2.2 Enter invalid Search String R001,W001,X002,E001 X002,E001 R002,W001 Invalid Search String 8 Test Story Contribution (CFP): 8 6 4 Test Size 18 Test Case Measurements for Test Story CT-A.2 l “Bug” in 6.// Show Error Message è Detected with data base containing no data è Test Size is 4 CFP è 1 Defect1 Defect1 Defect1 Defect found! 1 Entry (E) + 2 eXit (X) + 2 Read (R) + 1 Write (W) = 6 CFP User DataData 1.// Search Criteria Trigger 2.// Write Search 3.// Get Result 4.// Show Result 5.// Nothing Found 6.// Show Error Message
  • 20. 20IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Defect Observed One Defect Found è Possibly observable in all tests touching the data movement 6.// Show Error Message – named X002 è Counted once Name Label Description Name Label #001 Escape Chars Some characters such as 'ä' are wrongly interpreted as escape characetrs in strings R001 GetResult 1 Defects Observed Data Movements Affected Defect Count Test Story No. 2 Functional User Requirements CT-A.2 Detect Missing Data R001: Search Data R002: Answer Questions R003: Keep Data Safe Expected Response CFP CT-A.2.1 Enter valid Search String for No Data X002,R002,W001,E001 X001,R001,W001,E001 R002,W001 No Data Available 10 CT-A.2.2 Enter invalid Search String R001,W001,X002,E001 X002,E001 R002,W001 Invalid Search String 8 Test Story Contribution (CFP): 8 6 4 Test Size 18 Test Case Measurements for Test Story CT-A.2
  • 21. 21IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Test Status Reporting l Test Status Characterization è Test Size is the total number of data movements executed in all Test Cases of all test stories è One Data Movement can have only one defect identified per Test Story l However, one misbehavior found might affect more than one data movement and thus count for more than one defect Test Status Summary Total CFP: 6 Defects Pending for Removal: 2 Test Size in CFP: 41 Defects Found in Total: 2 Test Intensity in CFP: 6.8 Defect Density: 33% Test Coverage: 100%
  • 22. 22IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Caveat l Test size increases with meaningless test cases added to the test stories – little variations of test data with almost identical expected responses might spoil measurements! è We need a metric indicating that our test strategy is appropriate
  • 23. 23IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com What is Six Sigma Testing?
  • 24. 24IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com What is Lean Six Sigma Testing? Replace manyReplace many Test StoriesTest Stories…… … by those needed for the Eigensolution …… go for thego for the Eigenvector!Eigenvector!
  • 25. 25IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Calculating the Eigenvector with Jacobi Iterative AAAAT x
  • 26. 26IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Calculating the Eigenvector with Jacobi Iterative AAAAT x9999 0 3 0 0 9999 0 8888 1 0 5 3 9999 0 0 9999 3 0 0 8888 90 0 24 0 145 24 24 24 35
  • 27. 27IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Test Stories GoalTestCoverage RetrievePreviousResponses DetectMissingData DataStaysUntouched AchievedCoverage CT-A.1 CT-A.2 CT-A.3 R001 Search Data 0.62 5 8888 2 0.64 R002 Answer Questions 0.69 2 6 8888 0.66 R003 Keep Data Safe 0.37 4 4 2 0.40 Ideal Profile for Test Stories 0.43 0.74 0.51 Convergence Gap 0.42 0.7 0.5 0.04 0.10 Convergence Range 0.20 Convergence Limit Test Stories Deployment Combinator Functional User Requirements Measuring Test Coverage with Eigensolution Number ofNumber of data movementsdata movements executedexecuted
  • 28. 28IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Lean & Six Sigma for Software Testing Six Sigma è Design of Experiments è Multi-linear Regression for Root Cause Analysis and process control l Lean è Detect Waste (muda, 無駄 ) è Test-Driven Development è Defect-free delivery ll Lean Six SigmaLean Six SigmaLean Six SigmaLean Six SigmaLean Six SigmaLean Six SigmaLean Six SigmaLean Six Sigma è Predict Waste (muda, 無駄) è Eigenvectors solutionsEigenvectors solutionsEigenvectors solutionsEigenvectors solutions for Root Cause Analysis and process control è Predict Defect DensityDefect DensityDefect DensityDefect Density è Q Control ChartsQ Control ChartsQ Control ChartsQ Control Charts for SW Testing
  • 29. 29IT Confidence 2014 – October 22, 2014 http://itconfidence2014.wordpress.com Questions?