Ingegneria del Software II academic year: Course Web-site: [

Size: px
Start display at page:

Download "Ingegneria del Software II academic year: Course Web-site: [www.di.univaq.it/ingegneria2/]"

Transcription

1 Course: Ingegneria del Software II academic year: Course Web-site: [ Dependability and Software Qualities Lecturer: Henry Muccini and Vittorio Cortellessa Computer Science Department University of L'Aquila -Italy [ [

2 Copyright Notice» The material in these slides may be freely reproduced and distributed, partially or totally, as far as an explicit reference or acknowledge to the material author is preserved. Henry Muccini 2

3 Acknowledgment» This material comes from: - Ian Sommerville, Software Engineering 7th edition, chapters 20, 24, and 3 - Ian Sommerville, Software Engineering 6th edition, chapter 16 - Henry Muccini, ICS 122 course on Software Specification and Quality Engineering, year 2002, 3

4 Topics covered» Dependability» Dependable processes» Software Qualities and Dependability - Reliability - Safety - Security» Other qualities 4

5 Dependability The extent to which a critical system is trusted by its users 5

6 Software dependability» In general, software customers expect all software to be dependable. However, for non-critical applications, they may be willing to accept some system failures.» Some applications, however, have very high dependability requirements and special software engineering techniques may be used to achieve this. 6

7 The concept of dependability» For critical systems, it is usually the case that the most important system property is the dependability of the system» The dependability of a system reflects the user s degree of trust in that system. It reflects the extent of the user s confidence that it will operate as users expect and that it will not fail in normal use» Usefulness and trustworthiness are not the same thing. A system does not have to be trusted to be useful 7

8 Dependability achievement» Fault avoidance - The system is developed in such a way that human error is avoided and thus system faults are minimised. - The development process is organised so that faults in the system are detected and repaired before delivery to the customer.» Fault detection - Verification and validation techniques are used to discover and remove faults in a system before it is deployed. 8

9 Costs of increasing dependability Cost Dependability 9 Low Medium High Very high Ultrahigh

10 Dependability costs» Dependability costs tend to increase exponentially as increasing levels of dependability are required» There are two reasons for this - The use of more expensive development techniques and hardware that are required to achieve the higher levels of dependability - The increased testing and system validation that is required to convince the system client that the required levels of dependability have been achieved 10

11 Dependable processes» To ensure a minimal number of software faults, it is important to have a well-defined, repeatable software process.» A well-defined repeatable process is one that does not depend entirely on individual skills; rather can be enacted by different people.» For fault detection, it is clear that the process activities should include significant effort devoted to verification and validation. 11

12 Validation activities» Requirements inspections.» Requirements management.» Model checking.» Design and code inspection.» Static analysis.» Test planning and management.» Configuration management is also essential. 12

13 Dimensions of dependability Dependability Availability Reliability Safety Security The ability of the system to deliver services when requested The ability of the system to deliver services as specified? The ability of the system to operate without catastrophic failure The ability of the system to protect itelf against accidental or deliverate intrusion 13

14 Quality Factors Classification Functional: what the software does integrity reliability survivability usability Performance: how well it does it correctness efficiency safety interoperability Change: modifying the software maintainability expandability flexibility portability reusability Management: planning, controlling, testing, installation verifiability manageability 14

15 Exercise 1) B2C Web Application: - We want to analyze a Web system in which users can view and buy products - The payment may be done on-line - Different categories of products may be found 2) Nuclear Power Plant: - A Sensor component stores information/parameters on a Db (e.g., temperature, pressure) - A Control component checks parameters from the Db - When parameters value are unexpected, the Control stops the system 15» What are the quality attributes of this system?

16 Topics covered [Sommerville 7, ch 24]» Reliability validation» Safety assurance» Security assessment» Safety and dependability cases 16

17 Validation of critical systems» The verification and validation costs for critical systems involves additional validation processes and analysis than for non-critical systems. Such costs are worthy when: - The costs and consequences of failure are high so it is cheaper to find and remove faults than to pay for system failure; - You may have to make a formal case to customers or to a regulator that the system meets its dependability requirements. This dependability case may require specific V & V activities to be carried out. 17

18 Reliability [ICS 122 course]» Reliability deals with the rate of failures in the software that render it unusable - reliability is a statistical property: theprobability that software will operate without failure over a specified period of time, where failures include > software returns incorrect results > results are not accurate enough > response time is too slow > software stops without recovering» Fitness for use regarding reliability 18 time between failures is acceptable

19 Reliability (cont.) [ICS 122 course]» Rareamong commercial software groups» More applied in medical systems, military groups, on board weapons systems - and other software that controls the operation of large and complex machinery» Reliability measurements: - Mean time to failure (MTTF) - Mean time between failures (MTBF) 19

20 Reliability validation» Reliability validation involves exercising the program to assess whether or not it has reached the required level of reliability.» This cannot normally be included as part of a normal defect testing process because data for defect testing is (usually) atypical of actual usage data.» Reliability measurement therefore requires a specially designed data set that replicates the pattern of inputs to be processed by the system. 20

21 The reliability measurement process Identify operational profiles Prepare test data set Apply tests to system Compute observed reliability» Establish the operational profile for the system.» Construct test data reflecting the operational profile.» Test the system and observe the number of failures and the times of these failures. 21» Compute the reliability after a statistically significant number of failures have been observed.

22 Exercise» Apply this reliability measurement process to the selected case study 22

23 Statistical testing» Testing software for reliability rather than fault detection.» Measuring the number of errors allows the reliability of the software to be predicted. Note that, for statistical reasons, more errors than are allowed for in the reliability specification must be induced.» An acceptable level of reliability should be specified and the software tested and amended until that level of reliability is reached. 23

24 Reliability measurement problems» Operational profile uncertainty - The operational profile may not be an accurate reflection of the real use of the system.» High costs of test data generation - Costs can be very high if the test data for the system cannot be generated automatically.» Statistical uncertainty - You need a statistically significant number of failures to compute the reliability but highly reliable systems will rarely fail. 24

25 Operational profiles» An operational profile is a set of test data whose frequency matches the actual frequency of these inputs from normal usage of the system (the same frequency use expected in normal usage). - A close match with actual usage is necessary otherwise the measured reliability will not be reflected in the actual usage of the system.» It can be generated from real data collected from an existing system or (more often) depends on assumptions made about the pattern of usage of a system. (e.g., telecom systems) 25

26 Operational profile generation» Should be generated automatically whenever possible.» Automatic profile generation is difficult for interactive systems and for new and innovative systems» Operational profile is also difficult when dealing with users with different skills» Maybe straightforward for normal inputs but it is difficult to predict unlikely inputs and to create test data for them.» Referece: Musa 1998, Software Reliability Engineering: More reliable Software, Faster Development and Testing 26

27 An operational profile Number of inputs Input classes... 27

28 Reliability prediction» It is really important to stop testing as soon as possible and not overtest the system» Areliability growth model is a mathematical model of the system reliability change as it is tested and faults are removed.» It is used as a means of reliability prediction by extrapolating from current data - Simplifies test planning and customer negotiations. - You can predict when testing will be completed and demonstrate to customers whether or not the reliability growth will ever be achieved.» Prediction depends on the use of statistical testing to measure the reliability of a system version. 28

29 Observed reliability growth» The equal-step growth model is simple but it does not normally reflect reality.» Reliability does not necessarily increase with change as the change can introduce new faults.» The rate of reliability growth tends to slow down with time as frequently occurring faults are discovered and removed from the software.» A random-growth model where reliability changes fluctuate may be a more accurate reflection of real changes to reliability. 29

30 Growth model selection» Many different reliability growth models have been proposed.» There is no universally applicable growth model.» Reliability should be measured and observed data should be fitted to several models.» The best-fit model can then be used for reliability prediction (Kan 2003, model) 30

31 Equal-step reliability growth [Jelinski and Moranda, 1972] Reliability (ROCOF) Rate of Occurrence of software failures t1 t2 t3 t4 t5 Time 31

32 Random-step reliability growth [Littlewood and Verral, 1973] Reliability (ROCOF) Rate of Occurrence of software failures Note different reliability improvements Fault repair ad ds ne w fault and decreases reliability (increases ROC OF) t1 t2 t3 t4 t5 Time 32

33 Reliability prediction [Kan, 2003] Reliability = Measur ed reliability Fitted reliability model curv e Required reliability Estima ted time of reliability achie vement Time 33

34 Safety [ICS 122 course]» Safety deals with the absence of unsafe software conditions» Safety def: theexecution of software within a system context without resulting in unacceptable risks and the absence of danger by using the software» Safety critical systems systems in which computers are capable of causing death or injury (e.g., Trmcs), or catastrophic events to the environment» Fitness for use regarding safety software can be trusted to avoid hazardous behavior 34

35 An example [ Fatal Defect book, Ivars Peterson, 1995, page37]» Therac-25 - Incident > radiation-treatment machine for cancer therapy patients > A combination of rare keystrokes > Overdose of radiation to patients > 6 killed or injured - Problem > Poor software engineering practices along w/ building a machine that relies on the software for safe operation. 35

36 An example» Sizewell B nuclear power plant - 10,000 lines of code used to shut down the nuclear plant in caseof an increase in temperature. - When inspected it failed about 1/2 of them. - Failure was blamed on the test not the software. - Declared safe but lowered the chance of an accident from 10,000 to 1,

37 Safety assurance» Safety assurance and reliability measurement are quite different: - Within the limits of measurement error, you know whether or not a required level of reliability has been achieved; - However, quantitative measurement of safety is impossible. Safety assurance is concerned with establishing a confidence level in the system. 37

38 Safety confidence» Confidence in the safety of a system can vary from very low to very high.» Confidence is developed through: - Past experience with the company developing the software; - The use of dependable processes and process activities geared to safety; - Extensive V & V including both static and dynamic validation techniques. 38

39 Safety arguments» Safety arguments are intended to show that the system cannot reach in unsafe state.» These are weaker than correctness arguments which must show that the system code conforms to its specification.» They are generally based on proof by contradiction - Assume that an unsafe state can be reached; - Show that this is contradicted by the program code. 39» A graphical model of the safety argument may be developed.

40 Construction of a safety argument» Establish the safe exit conditions for a component or a program.» Starting from the END of the code, work backwards until you have identified all paths that lead to the exit of the code.» Assume that the exit condition is false.» Show that, for each path leading to the exit that the assignments made in that path contradict the assumption of an unsafe exit from the component. 40

41 Safety related process activities» Creation of a hazard logging and monitoring system.» Appointment of project safety engineers.» Extensive use of safety reviews.» Creation of a safety certification system.» Detailed configuration management (see Chapter 29). 41

42 Hazard analysis» Hazard analysis involves identifying hazards and their root causes.» There should be clear traceability from identified hazards through their analysis to the actions taken during the process to ensure that these hazards have been covered.» A hazard log may be used to track hazards throughout the process. 42

43 Hazard log entry Hazard Log. Page 4: Printed System: Insulin Pump System Safety Engineer: James Brown File: InsulinPump/Safety/HazardLog Log version: 1/3 Identified Hazard Insulin overdose delivered to patient Identified by Jane Williams Criticality class 1 Identified risk High Fault tree identified YES Date Location Hazard Log, Page 5 Fault tree creators Jane Williams and Bill Smith Fault tree checked YES Date Checker James Brown System safety design requirements 1. The system shall include self-testing software that will test the sensor system, the clock and the insulin delivery system. 2. The self-checking software shall be executed once per minute 3. In the event of the self-checking software discovering a fault in any of the system components, an audible warning shall be issued and the pump display should indicate the name of the component where the fault has been discovered. The delivery of insulin should be suspended. 4. The system shall incorporate an override system that allows the system user to modify the computed dose of insulin that is to be delivered by the system. 5. The amount of override should be limited to be no greater than a pre-set value that is set when the system is configured by medical staff. 43

44 Run-time safety checking» During program execution, safety checks can be incorporated as assertions to check that the program is executing within a safe operating envelope.» Assertions can be included as comments (or using an assert statement in some languages). Code can be generated automatically to check these assertions. 44

45 Security assessment» Security assessment has something in common with safety assessment.» It is intended to demonstrate that the system cannot enter some state (an unsafe or an insecure state) rather than to demonstrate that the system can do something.» However, there are differences - Safety problems are accidental; security problems are deliberate; 45 - Safety problems are mostly related to the application domain. Securityproblems are more generic -many systems suffer from the same problems.

46 Security validation» Experience-based validation - The system is reviewed and analysed against the types of attack that are known to the validation team.» Tool-based validation - Various security tools such as password checkers are used to analyse the system in operation.» Tiger teams - A team is established whose goal is to breach the security of the system by simulating attacks on the system.» Formal verification 46 - The system is verified against a formal security specification.

47 Key points» Reliability measurement relies on exercising the system using an operational profile -a simulated input set which matches the actual usage of the system.» Reliability growth modelling is concerned with modelling how the reliability of a software system improves as it is tested and faults are removed.» Safety arguments or proofs are a way of demonstrating that a hazardous condition can never occur. 47

48 Key points» It is important to have a dependable process for safetycritical systems development. The process should include hazard identification and monitoring activities.» Security validation may involve experience-based analysis, tool-based analysis or the use of tiger teams to attack the system.» Safety cases collect together the evidence that a system is safe. 48

49 Software Qualities (from the ICS122 course) 49

50 Integrity» Integrity deals with security against either overt or covert access to program or data - unauthorized access, which may be accidental or deliberate» Integrity guarantee that: - the information cannot be modified and that - the information arrives to the recipient as it has been sent» Also implemented through one-way hash functions 50 hash(t) hash(d), " T D

51 Security» Access Control» Authentication» Confidentiality» Data Integrity» Traffic Flow Integrity» Assured Usage 51

52 Survivability» Survivability deals with the continuity of reliable software execution in the presence of system failures - possibly with degraded functionality - robustness» Survivability is the ability to complete a mission successfully in the face of hostile fire (in weapon systems.)» Survivability is the ability of a network computing system to provide essential services in the presence of attacks and failures, and recover full services in a timely manner (in network systems)» Fitness for use regarding survivability user can still use essential functions even though some part of system is down 52

53 Usability» Usability deals with how easy the software is to use (by all users) - initial effort required to learn > enhanced or degraded by readability of documentation - recurring effort to use > enhanced or degraded by naturalness of user interface - general functionality of the software - usability is an extremely subjective property» Fitness for use regarding usability software is easier to use than not to use for software team, software is understandable 53

54 Correctness» Correctness deals with the extent to which the software design and implementation conform to stated requirements - correctness concerns include > all specified functions are implemented (functional correctness) > design is documented according to standard (document correctness) > performance of software is within constraints (performance correctness) - a requirements specification must be available for which it is possible to determine whether the software is consistent» Fitness for use regarding correctness what was produced is what was specified 54

55 Efficiency» Efficiency deals with resources needed to provide required functionality - resources include > processor > memory > disk space > communication» Fitness for use regarding efficiency resources required for software execution are affordable 55

56 Interoperability» Interoperability deals with how easy it is to couple software with other systems or applications - coupling involves integration - interoperability is enhanced by defining standard interfaces in application domains» Fitness for use regarding interoperability software produces or uses results that comply with industry standards and/or provides an open interface that can be used by others Middlewaresand APIs 56

57 Maintainability» Maintainability deals with the ease of changing and modifying the system - Corrective maintenance: removal of residual faults, or bugs, in software after delivery (~20%) > note: this does not include adaptive or perfective maintenance» Maintainability becomes important when systems are required to be used for long time - Year 2000 problem» Fitness for use regarding maintainability software is productive during maintenance, defect detection and correction is appropriately handled by issuance of a new release 57 for software team, software is easy to modify

58 Expandability» Expandability deals with the perfective aspects of software maintenance - increasing the software s functionality or performance to meet new user needs - Perfective maintenance: changing software to improve qualities (~50%)» Fitness of use regarding expandability software was built to be open ended 58 for software team, software is easy to modify and add new capabilities

59 Flexibility» Flexibility deals with the adaptive aspects of software maintenance» The ability of the product option to incorporate future additions, augmentations or expansions without requiring you to purchase a new version of the same product - adaptive maintenance: modifying software to operate in different environments (~30%)» Fitness of use regarding flexibility 59 software is readily adaptable to a wide range of environments without resorting to expandability-type changes

60 Portability» Portability deals transporting the software to execute on a different platform - platform could be > hardware: processor > software platform: operating system, compiler» Software needs to able to adapt to new hardware configurations.» Fitness of use regarding portability software may be used on several different platforms without resorting to flexibility-type changes 60

61 Reusability» Reusability deals with use of portions of software for other applications - perhaps with minor modification» COTS and CBSE» Regression Testing - Ariane 5 failure» Defect reduction and integration problems» Fitness of use regarding reusability 61 software consists of a large library of building blocks that can be used somewhat independently

62 Verifiability» Verifiability deals with how easy it is to determine if it satisfies the desired attributes - Verifiability can be performed by automated testing and analysis procedures - Verifiability can be improved by monitoring the desired properties - It needs an adequate definition of desired attributes» Fitness of use regarding verifiability simple to certify that the software is correct 62

63 Manageability» Manageability deals with the administrative aspects of software modification - manageability includes > tools to support changes: both planning and control > media control: installation» Fitness of use regarding manageability support environment is adequate and easy to use 63

64 Related Operational Qualities» Suitability: presence and appropriateness of functionality for specified task» Accuracy: provision of right precision and effects» Compliance: adherence to application-related standards or conventions» Fault Tolerance: ability to maintain specified level of performance in case of faulty software» Recoverability: ability to re-establish level of performance or recover data in case of failure 64

65 Related Operational Qualities» Understandability: user s effort in recognizing the logical concept and applicability» Learnability: user s effort in learning software s application (operational control, input, output)» Operability: user s effort for operational control 65

66 Related Maintenance Qualities» Understandability: developer s effort in recognizing the logical concepts in the code» Analyzability: effort required for diagnosis of deficiencies or cause of failure» Stability: risk of unexpected effect of modification» Testability: effort needed to test software to validate modifications (or correctness) 66

67 Related Maintenance Qualities» Installability: effort needed to install software in specified environment» Conformance: adherence to standards or conventions related to portability» Replaceability: opportunity and effort of using software in place of other system in the environment 67

68 To Conclude» There are more than 50 different quality attributes that could be analyzed» but we are not interested in doing that» There is the need to PRIORITIZE quality attributes, in order to be able to create a rank: - 5. Mandatory - 4. Very important - 3. Rather important - 2. Not important Does not Matter

Lecture 9 Dependability; safety-critical systems

Lecture 9 Dependability; safety-critical systems Lecture 9 Dependability; safety-critical systems Kari Systä 17.3.2014 17.3.2014 TIE-21100/21101; K.Systä 1 Week Lecture Exercise 10.3 Quality in general; Patterns Quality management systems 17.3 Dependable

More information

Critical Systems Specification. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 9 Slide 1

Critical Systems Specification. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 9 Slide 1 Critical Systems Specification Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 9 Slide 1 Objectives To explain how dependability requirements may be identified by analysing the risks faced

More information

Objectives. Dependability requirements. Topics covered. Stages of risk-based analysis. Risk-driven specification. Critical Systems Specification

Objectives. Dependability requirements. Topics covered. Stages of risk-based analysis. Risk-driven specification. Critical Systems Specification Objectives Critical Systems Specification To explain how dependability requirements may be identified by analysing the risks faced by critical systems To explain how safety requirements are generated from

More information

Dependability requirements. Risk-driven specification. Objectives. Stages of risk-based analysis. Topics covered. Critical Systems Specification

Dependability requirements. Risk-driven specification. Objectives. Stages of risk-based analysis. Topics covered. Critical Systems Specification Dependability requirements Critical Systems Specification Functional requirements to define error checking and recovery facilities and protection against system failures. Non-functional requirements defining

More information

Engineering systems to avoid disasters

Engineering systems to avoid disasters Critical Systems Engineering Engineering systems to avoid disasters Adapted from Ian Sommerville CSE 466-1 Objectives To introduce the notion of critical systems To describe critical system attributes

More information

Software Quality Factors

Software Quality Factors Software Quality Factors The need for a comprehensive software quality requirements There are some characteristic common : All the software projects satisfactory fulfilled the basic requirements for correct

More information

Bugs are costly... Kinds of Quality Assurance

Bugs are costly... Kinds of Quality Assurance Bugs are costly... 1. Types of bugs (What type of bugs have you had in the past?) a. Race conditions and deadlocks b. Library misuse c. Logical errors (off by one, null, buffer overflow) d. Usability e.

More information

mywbut.com Software Reliability and Quality Management

mywbut.com Software Reliability and Quality Management Software Reliability and Quality Management 1 Software Reliability Issues 2 Specific Instructional Objectives At the end of this lesson the student would be able to: Differentiate between a repeatable

More information

Software Quality Management

Software Quality Management 2004-2005 Marco Scotto (Marco.Scotto@unibz.it) Contents Definitions Quality of the software product Special features of software Early software quality models Boehm model McCall model Standard ISO 9126

More information

Introduction To Software Testing. Brian Nielsen. Center of Embedded Software Systems Aalborg University, Denmark CSS

Introduction To Software Testing. Brian Nielsen. Center of Embedded Software Systems Aalborg University, Denmark CSS Introduction To Software Testing Brian Nielsen bnielsen@cs.auc.dk Center of Embedded Software Systems Aalborg University, Denmark CSS 1010111011010101 1011010101110111 Software development cycle 1. Programmer

More information

Software Quality. Lecture 4 CISC 323. Winter 2006

Software Quality. Lecture 4 CISC 323. Winter 2006 Software Quality Lecture 4 CISC 323 Winter 2006 Prof. Lamb malamb@cs.queensu.ca Prof. Kelly kelly-d@rmc.ca Required Reading Barbara Kitchenam, Sheri Lawrence Pfleeger; The Elusive Target, IEEE Software

More information

REQUIREMENTS FOR SAFETY RELATED SOFTWARE IN DEFENCE EQUIPMENT PART 1: REQUIREMENTS

REQUIREMENTS FOR SAFETY RELATED SOFTWARE IN DEFENCE EQUIPMENT PART 1: REQUIREMENTS Ministry of Defence Defence Standard 00-55(PART 1)/Issue 2 1 August 1997 REQUIREMENTS FOR SAFETY RELATED SOFTWARE IN DEFENCE EQUIPMENT PART 1: REQUIREMENTS This Part 1 of Def Stan 00-55 supersedes INTERIM

More information

Requirements Gathering using Object- Oriented Models

Requirements Gathering using Object- Oriented Models Requirements Gathering using Object- Oriented Models Software Quality Assurance What is software? According to the IEEE (Institute of Electrical and Electronics Engineers) A software is: Programs, procedures,

More information

Achieving Quality Requirements with Reused Software Components:

Achieving Quality Requirements with Reused Software Components: Achieving Quality Requirements with Reused Software Components: Challenges to Successful Reuse Second International Workshop on Models and Processes for the Evaluation of off-the-shelf Components (MPEC

More information

9. Verification, Validation, Testing

9. Verification, Validation, Testing 9. Verification, Validation, Testing (a) Basic Notions (b) Dynamic testing. (c) Static analysis. (d) Modelling. (e) Environmental Simulation. (f) Test Strategies. (g) Tool support. (h) Independent Verification

More information

Chapter 6: Software Evolution and Reengineering

Chapter 6: Software Evolution and Reengineering Chapter 6: Software Evolution and Reengineering Harald Gall Software Engineering Group www.ifi.unizh.ch/swe/ Universität Zürich Institut für Informatik Ian Sommerville 2004 Software Engineering, 7th edition.

More information

Testing throughout the software life cycle. Software Testing: INF3121 / INF4121

Testing throughout the software life cycle. Software Testing: INF3121 / INF4121 Testing throughout the software life cycle Software Testing: INF3121 / INF4121 Summary: Week 2 Software development models Sequential / Iterative-Incremental / Testing within a life cycle Test levels Component

More information

Lecture 2: Software Quality Factors, Models and Standards. Software Quality Assurance (INSE 6260/4-UU) Winter 2016

Lecture 2: Software Quality Factors, Models and Standards. Software Quality Assurance (INSE 6260/4-UU) Winter 2016 Lecture 2: Software Quality Factors, Models and Standards Software Quality Assurance (INSE 6260/4-UU) Winter 2016 INSE 6260/4-UU Software Quality Assurance Software Quality Quality Assurance Factors and

More information

Software engineering Facts. CSC Compiler Construction Software Engineering Topics. What is software engineering? What is software?

Software engineering Facts. CSC Compiler Construction Software Engineering Topics. What is software engineering? What is software? Software engineering Facts CSC 4181 - Compiler Construction Software Engineering Topics Fact: The economies of ALL developed nations are dependent on software. Fact: More and more systems are software

More information

Software Quality Management

Software Quality Management Software Quality Management Minsoo Ryu Hanyang University msryu@hanyang.ac.kr Outline Software Quality Model Software Quality Management Process and Quality Quality Metrics 2 2 What is Quality? Quality,

More information

Measuring and Assessing Software Quality

Measuring and Assessing Software Quality Measuring and Assessing Software Quality Issues, Challenges and Practical Approaches Kostas Kontogiannis Associate Professor, NTUA kkontog@softlab.ntua.gr The Software Life Cycle Maintenance Requirements

More information

Chapter 6-1: Failure Modes Effect Analysis (FMCEA)

Chapter 6-1: Failure Modes Effect Analysis (FMCEA) Chapter 6-1: Failure Modes Effect Analysis (FMCEA) Learning Outcomes: After careful studying this lecture You should be able: To Define FMEA To understand the use of Failure Modes Effect Analysis (FMEA)

More information

dependable systems Basic Concepts & Terminology

dependable systems Basic Concepts & Terminology dependable systems Basic Concepts & Terminology Dependability Dependability is that property of a computer system such that reliance can justifiably be placed on the service it delivers. J. C. Laprie Dependability

More information

2003 John Mylopoulos Non-Functional Requirements John Mylopoulos Non-Functional Requirements -- 4

2003 John Mylopoulos Non-Functional Requirements John Mylopoulos Non-Functional Requirements -- 4 II. Non-Functional Requirements (or, Quality Factors) What are Non-Functional Requirements (NFRs)? Classification of NFRs Criteria and Factors,, Performance Example NFR for an Automated Money Machine Non-Functional

More information

Test Management: Part I. Software Testing: INF3121 / INF4121

Test Management: Part I. Software Testing: INF3121 / INF4121 Test Management: Part I Software Testing: INF3121 / INF4121 Summary: Week 6 Test organisation Independence Tasks of the test leader and testers Test planning and estimation Activities Entry and exit criteria

More information

version NDIA CMMI Conf 3.5 SE Tutorial RE - 1

version NDIA CMMI Conf 3.5 SE Tutorial RE - 1 Requirements Engineering SE Tutorial RE - 1 What Are Requirements? Customer s needs, expectations, and measures of effectiveness Items that are necessary, needed, or demanded Implicit or explicit criteria

More information

Dependable Technologies For Critical Systems. Software Verification. 22 nd May Technologies Ltd 2011 Critical Software

Dependable Technologies For Critical Systems. Software Verification. 22 nd May Technologies Ltd 2011 Critical Software Dependable Technologies For Critical Systems Software Verification 22 nd May 2012 Dependable Technologies For Critical Systems Agenda When Things Go Wrong... Certifying Software Safety Critical Systems

More information

Software Quality. A Definition of Quality. Definition of Software Quality. Definition of Implicit Requirements

Software Quality. A Definition of Quality. Definition of Software Quality. Definition of Implicit Requirements Definition of Software Quality Software Quality The Ultimate Goal of Software Engineering Software must conformance to explicit and implicit requirements if it is to be considered to be of good quality.

More information

Led by the Author Attended by a peer group Varying level of formality Knowledge gathering Defect finding

Led by the Author Attended by a peer group Varying level of formality Knowledge gathering Defect finding Technical Review Walkthrough Review Inspection Review Informal Review A Technical Review is a type of peer review, and is considered to be a formal review type, even though no Managers are expected to

More information

DO-178B 김영승 이선아

DO-178B 김영승 이선아 DO-178B 201372235 김영승 201372237 이선아 Introduction Standard Contents SECTION 1 INTRODUCTION SECTION 2 SYSTEM ASPECTS RELATING TO SOFTWARE DEVELOPMENT SECTION 3 SOFTWARE LIFE CYCLE SECTION 4 SOFTWARE PLANNING

More information

Disciplined Software Testing Practices

Disciplined Software Testing Practices isciplined oftware Testing Practices r. Magdy Hanna Chairman International Institute for oftware Testing ponsored by: International Institute for oftware Testing International Institute for oftware Testing,

More information

Introduction to software testing and quality process

Introduction to software testing and quality process Introduction to software testing and quality process Automated testing and verification J.P. Galeotti - Alessandra Gorla Engineering processes Engineering disciplines pair construction activities activities

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2 BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2 Friday 30 th September 2016 - Morning Answer any THREE questions

More information

Chapter 6. Software Quality Management & Estimation

Chapter 6. Software Quality Management & Estimation Chapter 6 Software Quality Management & Estimation What is Quality Management Also called software quality assurance (SQA) s/w quality:- It is defined as the degree to which a system, components, or process

More information

Research on software systems dependability at the OECD Halden Reactor Project

Research on software systems dependability at the OECD Halden Reactor Project Research on software systems dependability at the OECD Halden Reactor Project SIVERTSEN Terje 1, and ØWRE Fridtjov 2 1. Institute for Energy Technology, OECD Halden Reactor Project, Post Box 173, NO-1751

More information

Atlant s atwatch CAPA TM. Corrective and Preventive Action System (CAPA) Product & Services Bundle for

Atlant s atwatch CAPA TM. Corrective and Preventive Action System (CAPA) Product & Services Bundle for Corrective and Preventive Action System (CAPA) Product & Services Bundle for Atlant s atwatch CAPA TM Atlant Systems, Inc. (781)325-8157 team@atlantsystems.com Effectively Manage CAPAs Globally According

More information

WORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B

WORK PLAN AND IV&V METHODOLOGY Information Technology - Independent Verification and Validation RFP No IVV-B 1. Work Plan & IV&V Methodology 1.1 Compass Solutions IV&V Approach The Compass Solutions Independent Verification and Validation approach is based on the Enterprise Performance Life Cycle (EPLC) framework

More information

MSc Software Testing MSc Prófun hugbúnaðar

MSc Software Testing MSc Prófun hugbúnaðar MSc Software Testing MSc Prófun hugbúnaðar Fyrirlestrar 1 & 2 The SWEBOK Chapter on Software Testing IEEE http://www.swebok.org/ 29/08/2007 Dr Andy Brooks 1 Repeat after Andy: software contains faults,

More information

MSc Software Testing and Maintenance MSc Prófun og viðhald hugbúnaðar

MSc Software Testing and Maintenance MSc Prófun og viðhald hugbúnaðar MSc Software Testing and Maintenance MSc Prófun og viðhald hugbúnaðar Fyrirlestrar 25 & 26 The SWEBOK Chapter on Software Testing IEEE http://www.swebok.org/ 19/10/2005 Dr Andy Brooks 1 Repeat after Andy:

More information

Introduction. Fundamental concepts in testing

Introduction. Fundamental concepts in testing INF 3121 Software Testing - Lecture 01 Introduction. Fundamental concepts in testing 1. Why is testing necessary?? 4. Fundamental test process 5. The psychology of testing 1 1. Why is testing necessary?

More information

CHAPTER 41 MAINTAINABILITY DEMONSTRATION CONTENTS

CHAPTER 41 MAINTAINABILITY DEMONSTRATION CONTENTS Applied R&M Manual for Defence Systems Part C - R&M Related Techniques CHAPTER 41 MAINTAINABILITY DEMONSTRATION CONTENTS 1 INTRODUCTION 2 2 PURPOSE OF MAINTAINABILITY DEMONSTRATION 2 3 PRINCIPLES OF DEMONSTRATION

More information

Managing System Performance

Managing System Performance Managing System Performance System performance directly affects users. Centralized operations are easier to measure than complex networks and client/server systems. Various statistics can be used to assess

More information

R.POONKODI, ASSISTANT PROFESSOR, COMPUTER SCIENCE AND ENGINEERING, SRI ESHWAR COLLEGE OF ENGINEERING, COIMBATORE.

R.POONKODI, ASSISTANT PROFESSOR, COMPUTER SCIENCE AND ENGINEERING, SRI ESHWAR COLLEGE OF ENGINEERING, COIMBATORE. R.POONKODI, ASSISTANT PROFESSOR, COMPUTER SCIENCE AND ENGINEERING, SRI ESHWAR COLLEGE OF ENGINEERING, COIMBATORE. UNIT I INTRODUCTION Testing as an Engineering Activity Testing as a Process Testing axioms

More information

Process Improvement. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 28 Slide 1

Process Improvement. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 28 Slide 1 Process Improvement Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 28 Slide 1 Objectives To explain the principles of software process improvement To explain how software process factors

More information

Software Engineering

Software Engineering Software Engineering (CS550) Software Testing - I Jongmoon Baik Objectives To define and understand what software testing is To understand software testing strategies To describe software testing processes

More information

Validation, Verification and MER Case Study

Validation, Verification and MER Case Study Validation, Verification and MER Case Study Prof. Chris Johnson, School of Computing Science, University of Glasgow. johnson@dcs.gla.ac.uk http://www.dcs.gla.ac.uk/~johnson Introduction. Definitions and

More information

AIRBORNE SOFTWARE VERIFICATION FRAMEWORK AIMED AT AIRWORTHINESS

AIRBORNE SOFTWARE VERIFICATION FRAMEWORK AIMED AT AIRWORTHINESS 27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES AIRBORNE SOFTWARE VERIFICATION FRAMEWORK AIMED AT AIRWORTHINESS Yumei Wu*, Bin Liu* *Beihang University Keywords: software airworthiness, software

More information

Automating Results Comparison Isn t Always Easy

Automating Results Comparison Isn t Always Easy Automating Results Comparison Isn t Always Easy (Oracle-Based Automated Test Design) C.E.S.A.R. Recife Summer School February 18, 2009 Douglas Hoffman, BACS, MBA, MSEE, ASQ-CSQE, ASQ-CMQ/OE, ASQ Fellow

More information

Introduction to Software Engineering

Introduction to Software Engineering Introduction to Software Engineering 2. Requirements Collection Mircea F. Lungu Based on a lecture by Oscar Nierstrasz. Roadmap > The Requirements Engineering Process > Functional and non-functional requirements

More information

Internal Control and the Computerised Information System (CIS) Environment. CA A. Rafeq, FCA

Internal Control and the Computerised Information System (CIS) Environment. CA A. Rafeq, FCA Internal Control and the Computerised Information System (CIS) Environment CA A. Rafeq, FCA 1 Agenda 1. Internal Controls and CIS Environment 2. Planning audit of CIS environment 3. Design and procedural

More information

Testing 2. Testing: Agenda. for Systems Validation. Testing for Systems Validation CONCEPT HEIDELBERG

Testing 2. Testing: Agenda. for Systems Validation. Testing for Systems Validation CONCEPT HEIDELBERG CONCEPT HEIDELBERG GMP Compliance for January 16-17, 2003 at Istanbul, Turkey Testing for Systems Validation Dr.-Ing. Guenter Generlich guenter@generlich.de Testing 1 Testing: Agenda Techniques Principles

More information

Software Processes. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1

Software Processes. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1 Software Processes Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 4 Slide 1 Objectives To introduce software process models To describe three generic process models and when they may be

More information

Introduction to Software Engineering

Introduction to Software Engineering Introduction to Software Engineering (CS350) Lecture 16 Jongmoon Baik Software Testing Strategy 2 What is Software Testing? Testing is the process of exercising a program with the specific intent of finding

More information

Chapter 24 - Quality Management. Chapter 24 Quality management

Chapter 24 - Quality Management. Chapter 24 Quality management Chapter 24 - Quality Management 1 Topics covered Software quality Software standards Reviews and inspections Software measurement and metrics 2 1. Software quality management Concerned with ensuring that

More information

Lectures 2 & 3. Software Processes. Software Engineering, COMP201 Slide 1

Lectures 2 & 3. Software Processes. Software Engineering, COMP201 Slide 1 Lectures 2 & 3 Software Processes Software Engineering, COMP201 Slide 1 What is a Process? When we provide a service or create a product we always follow a sequence of steps to accomplish a set of tasks

More information

Testing. CxOne Standard

Testing. CxOne Standard Testing CxOne Standard CxStand_Testing.doc November 3, 2002 Advancing the Art and Science of Commercial Software Engineering Contents 1 INTRODUCTION... 1 1.1 OVERVIEW... 1 1.2 GOALS... 1 1.3 BACKGROUND...

More information

Quality Standards in Open Source Lifecycle

Quality Standards in Open Source Lifecycle Quality Standards in Open Source Lifecycle Bogdan VINTILA Academy of Economic Studies, Bucharest, Romania vb@vintilabogdan.ro Abstract: Open source applications and components are very important for the

More information

INF 3121 Software Testing - Lecture 05. Test Management

INF 3121 Software Testing - Lecture 05. Test Management INF 3121 Software Testing - Lecture 05 Test Management 1. Test organization (20 min) (25 min) (15 min) (10 min) (10 min) (10 min) INF3121 / 23.02.2016 / Raluca Florea 1 1. Test organization (20 min) LO:

More information

ISTQB CTFL BH QuestionsAnswers with Explanation

ISTQB CTFL BH QuestionsAnswers with Explanation ISTQB CTFL BH0-10 - QuestionsAnswers with Explanation For Software Testing Articles Visit @ http://softwaretestinghelp.com Join the Best Software Testing Training Course @ http://softwaretestinghelp.org

More information

ISTQB Sample Question Paper Dump #11

ISTQB Sample Question Paper Dump #11 ISTQB Sample Question Paper Dump #11 1. Which of the following is true a. Testing is the same as quality assurance b. Testing is a part of quality assurance c. Testing is not a part of quality assurance

More information

Compliance driven Integrated circuit development based on ISO26262

Compliance driven Integrated circuit development based on ISO26262 Compliance driven Integrated circuit development based on ISO26262 Haridas Vilakathara Manikantan panchapakesan NXP Semiconductors, Bangalore Accellera Systems Initiative 1 Outline Functional safety basic

More information

Software Processes. Objectives. Topics covered. The software process. Waterfall model. Generic software process models

Software Processes. Objectives. Topics covered. The software process. Waterfall model. Generic software process models Objectives Software Processes To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software

More information

Super Schlumberger Scheduler

Super Schlumberger Scheduler Software Requirements Specification for Super Schlumberger Scheduler Page 1 Software Requirements Specification for Super Schlumberger Scheduler Version 0.2 Prepared by Design Team A Rice University COMP410/539

More information

Quality Management. Managing the quality of the design process and final

Quality Management. Managing the quality of the design process and final Quality Management Managing the quality of the design process and final product Objectives To introduce the quality management process and key quality management activities To explain the role of standards

More information

R214 SPECIFIC REQUIREMENTS: INFORMATION TECHNOLOGY TESTING LABORATORY ACCREDITATION PROGRAM

R214 SPECIFIC REQUIREMENTS: INFORMATION TECHNOLOGY TESTING LABORATORY ACCREDITATION PROGRAM A2LA R214 Specific Requirements: Information Technology Testing Laboratory Accreditation Document Revised: 3/5/18 Page 1 of 34 R214 SPECIFIC REQUIREMENTS: INFORMATION TECHNOLOGY TESTING LABORATORY ACCREDITATION

More information

Requirements Engineering: Part I. Software Requirements & Project Management CITS3220

Requirements Engineering: Part I. Software Requirements & Project Management CITS3220 Requirements Engineering: Part I Software Requirements & Project Management CITS3220 The Problems of Requirements What goal(s) are we trying to satisfy? How do we identify the scope and properties of the

More information

Results of the IEC Functional Safety Assessment

Results of the IEC Functional Safety Assessment Results of the IEC 61508 Functional Safety Assessment Project: 3051S Electronic Remote Sensors (ERS ) System Customer: Emerson Automation Solutions (Rosemount, Inc.) Shakopee, MN USA Contract No.: Q16/12-041

More information

PayPass Mag Stripe Vendor Testing Process (Cards & Devices)

PayPass Mag Stripe Vendor Testing Process (Cards & Devices) PayPass Mag Stripe Vendor Testing Process (Cards & Devices) Copyright The information contained in this manual is proprietary and confidential to MasterCard International Incorporated (MasterCard) and

More information

Ethics in Information Technology, Fourth Edition. Chapter 7 Software Development

Ethics in Information Technology, Fourth Edition. Chapter 7 Software Development Ethics in Information Technology, Fourth Edition Chapter 7 Software Development Objectives As you read this chapter, consider the following questions: Why do companies require high-quality software in

More information

Introduction and Revision of IEC 61508

Introduction and Revision of IEC 61508 Introduction and Revision of IEC 61508 Ron Bell OBE, BSc, CEng FIET Engineering Safety Consultants Ltd Collingham House 10-12 Gladstone Road Wimbledon London, SW19 1QT UK Abstract Over the past twenty-five

More information

Book Outline. Software Testing and Analysis: Process, Principles, and Techniques

Book Outline. Software Testing and Analysis: Process, Principles, and Techniques Book Outline Software Testing and Analysis: Process, Principles, and Techniques Mauro PezzèandMichalYoung Working Outline as of March 2000 Software test and analysis are essential techniques for producing

More information

Chapter 14. Simulation Modeling. Learning Objectives. After completing this chapter, students will be able to:

Chapter 14. Simulation Modeling. Learning Objectives. After completing this chapter, students will be able to: Chapter 14 Simulation Modeling To accompany Quantitative Analysis for Management, Eleventh Edition, by Render, Stair, and Hanna Power Point slides created by Brian Peterson Learning Objectives After completing

More information

Lecture 7 Software Product Design and Project Overview

Lecture 7 Software Product Design and Project Overview Lecture 7 Software Product Design and Project Overview Software Engineering ITCS 3155 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte September 16, 2008

More information

Lecture 6: Non-Functional Requirements (NFRs)

Lecture 6: Non-Functional Requirements (NFRs) Thanks'to'Prof.'Steve'Easterbrook' University'of'Toronto' ' Lecture 6: Non-Functional Requirements (NFRs) What are non-functional requirements Product-oriented qualities Process-oriented qualities Traceability

More information

Slide 1. Slide 2. Slide 3. Objectives. Who Needs Interoperability? Component 9 Networking and Health Information Exchange

Slide 1. Slide 2. Slide 3. Objectives. Who Needs Interoperability? Component 9 Networking and Health Information Exchange Slide 1 Component 9 Networking and Health Information Exchange Unit 8 Enterprise Architecture Models This material was developed by Duke University, funded by the Department of Health and Human Services,

More information

CHAPTER 52 SOFTWARE RELIABILITY EVALUATION CONTENTS

CHAPTER 52 SOFTWARE RELIABILITY EVALUATION CONTENTS Applied R&M Manual for Defence Systems Part C R&M Related Techniques CHAPTER 52 SOFTWARE RELIABILITY EVALUATION CONTENTS Page 1 Introduction 2 2 Evidence from Testing 2 3 Use of Field Data 3 4 Evidence

More information

Introduction to Software Engineering

Introduction to Software Engineering Introduction to Software Engineering Lecture 1 Dr Eliane L. Bodanese 1 Agenda Introductions Ground Rules What is the course about & course information Course texts Lecture and Exercises Assessment Coursework

More information

Chapter 1: Introduction

Chapter 1: Introduction Using UML, Patterns, and Java Object-Oriented Software Engineering Chapter 1: Introduction What is a computer program? A list of instructions, written in a specific programming language (Java, C, Fortran,

More information

CSC 408F/CSC2105F Lecture Notes. Quality Matters

CSC 408F/CSC2105F Lecture Notes. Quality Matters CSC 408F/CSC2105F Lecture Notes These lecture notes are provided for the personal use of students taking CSC 408H/CSC 2105H in the Fall term 2004/2005 at the University of Toronto. Copying for purposes

More information

Combining Risk Analysis and Slicing for Test Reduction in Open Architecture

Combining Risk Analysis and Slicing for Test Reduction in Open Architecture Calhoun: The NPS Institutional Archive Reports and Technical Reports All Technical Reports Collection 2014-05-01 Combining Risk Analysis and Slicing for Test Reduction in Open Architecture Berzins, Valdis

More information

Objectives. Rapid software development. Topics covered. Rapid software development. Requirements. Characteristics of RAD processes

Objectives. Rapid software development. Topics covered. Rapid software development. Requirements. Characteristics of RAD processes Objectives Rapid software development To explain how an iterative, incremental development process leads to faster delivery of more useful software To discuss the essence of agile development methods To

More information

How mature is my test organization: STDM, an assessment tool

How mature is my test organization: STDM, an assessment tool How mature is my test organization: STDM, an assessment tool Bonney Joseph, (Bonney.joseph@wipro.com) Nikhil Gupta, (Nikhil.gupta@wipro.com) Abstract Software ing thought of as a support function until

More information

A Systematic Approach to Performance Evaluation

A Systematic Approach to Performance Evaluation A Systematic Approach to Performance evaluation is the process of determining how well an existing or future computer system meets a set of alternative performance objectives. Arbitrarily selecting performance

More information

QuEST Forum. TL 9000 Quality Management System. Requirements Handbook

QuEST Forum. TL 9000 Quality Management System. Requirements Handbook QuEST Forum TL 9000 Quality Management System Requirements Handbook Point Release 6.1 The ICT Quality Management System Performance Excellence through Global ICT Quality Copyright Copyright 2017 Quality

More information

Platform-Based Design of Heterogeneous Embedded Systems

Platform-Based Design of Heterogeneous Embedded Systems Platform-Based Design of Heterogeneous Embedded Systems Ingo Sander Royal Institute of Technology Stockholm, Sweden ingo@kth.se Docent Lecture August 31, 2009 Ingo Sander (KTH) Platform-Based Design August

More information

Use of PSA to Support the Safety Management of Nuclear Power Plants

Use of PSA to Support the Safety Management of Nuclear Power Plants S ON IMPLEMENTATION OF THE LEGAL REQUIREMENTS Use of PSA to Support the Safety Management of Nuclear Power Plants РР - 6/2010 ÀÃÅÍÖÈß ÇÀ ßÄÐÅÍÎ ÐÅÃÓËÈÐÀÍÅ BULGARIAN NUCLEAR REGULATORY AGENCY TABLE OF CONTENTS

More information

Platform-Based Design of Heterogeneous Embedded Systems

Platform-Based Design of Heterogeneous Embedded Systems Platform-Based Design of Heterogeneous Embedded Systems Ingo Sander Royal Institute of Technology Stockholm, Sweden ingo@kth.se Docent Lecture August 31, 2009 Ingo Sander (KTH) Platform-Based Design August

More information

Software metrics. Jaak Tepandi

Software metrics. Jaak Tepandi Software metrics, Jekaterina Tšukrejeva, Stanislav Vassiljev, Pille Haug Tallinn University of Technology Department of Software Science Moodle: Software Quality (Tarkvara kvaliteet) Alternate download:

More information

Objectives. Topics covered. Software project management. Management activities. Software management distinctions. Project management

Objectives. Topics covered. Software project management. Management activities. Software management distinctions. Project management Objectives Project management To explain the main tasks undertaken by project managers To introduce software project management and to describe its distinctive characteristics To discuss project planning

More information

1 Introduction. 20 August 1995; 19:29 1 Master04.Doc

1 Introduction. 20 August 1995; 19:29 1 Master04.Doc 1 Introduction This master thesis concludes the study of computer science at the Rijks Universiteit of Leiden. The mentor for this project is dr. L.P.J. Groenewegen. The topic addressed in this master

More information

A2 MODULE 5 (ICT5) TOPIC 14.2 SOFTWARE

A2 MODULE 5 (ICT5) TOPIC 14.2 SOFTWARE Evaluation of software (Chapter 54) Describe the mechanisms/procedures for software evaluation. Establish client/user needs, establish software capabilities and match. Evaluation Criteria (Chapter 54)

More information

On various testing topics: Integration, large systems, shifting to left, current test ideas, DevOps

On various testing topics: Integration, large systems, shifting to left, current test ideas, DevOps On various testing topics: Integration, large systems, shifting to left, current test ideas, DevOps Matti Vuori www.mattivuori.net matti.vuori@mattivuori.net @Matti_Vuori TUT lecture series of SW Technologies:

More information

This document describes the overall software development process of microcontroller software during all phases of the Company Name product life cycle.

This document describes the overall software development process of microcontroller software during all phases of the Company Name product life cycle. Maturity Process Owner Check Release Description Valid Name / Department Name / Department Name / Department Detailed procedure for software development Title: Software Development Procedure Purpose: This

More information

Chapter 26 Process improvement

Chapter 26 Process improvement Chapter 26 Process improvement 1 Topics covered The process improvement process Process measurement Process analysis Process change The CMMI process improvement framework 2 Process improvement Many software

More information

Software Testing Principles and Strategies

Software Testing Principles and Strategies Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Certification of Safety-Critical Software Under DO-178C and DO-278A

Certification of Safety-Critical Software Under DO-178C and DO-278A Certification of Safety-Critical Software Under DO-178C and DO-278A Stephen A. Jacklin 1 NASA Ames Research Center, Moffett Field, CA, 94035 The RTCA has recently released DO-178C and DO-278A as new certification

More information

Accelerating Xilinx All Programmable FPGA and SoC Design Verification with Blue Pearl Software

Accelerating Xilinx All Programmable FPGA and SoC Design Verification with Blue Pearl Software Accelerating Xilinx All Programmable FPGA and SoC Design Verification with Blue Pearl Software Introduction Xilinx All Programmable FPGAs and SoCs are used across multiple markets, powering applications

More information

Jetstream Certification and Testing

Jetstream Certification and Testing PJM Interconnection 02/01/2016 This page is intentionally left blank. PJM 2016 www.pjm.com 2 P age Introduction Document Description PJM maintains and publishes a list of certified devices, software packages

More information

Testability of Dynamic

Testability of Dynamic System Engineering in the Energy Testability of Dynamic and Maritime Sectors: Towards a Real-Time Systems Solution Based on Model-Centric Processes Lionel Briand http:// www.roanoke slant.org Software

More information

ASTQB. ISTQB-Advanced-Lev3. ISTQB Advanced LevelTechnical Test. Download Full Version :

ASTQB. ISTQB-Advanced-Lev3. ISTQB Advanced LevelTechnical Test. Download Full Version : ASTQB ISTQB-Advanced-Lev3 ISTQB Advanced LevelTechnical Test Download Full Version : http://killexams.com/pass4sure/exam-detail/istqb-advanced-lev3 QUESTION: 52 Select the correct answer; I. Verifying

More information