SlideShare a Scribd company logo
1 of 12
Download to read offline
Defect Prevention
          Reducing Costs and Enhancing Quality

          Vamsi Krishna P Y
Agenda

- Concepts

- Why Defect Prevention?

- Phase Cost Ratio

- Methods of Defect Preventions

- Process Improvement Workflow
Concepts

  Universal thought “Prevention is Better than Cure” applies to
   Software development Life cycle as well as illness in medical
   science.

  Defects:
    Imperfections in software development process that would cause software
    to fail to meet the desired expectations”.

  Misconceptions:
    Lots of defects would emerge during the development process. but believe
    that defects get injected in the beginning of the cycle and are removed
    through the rest of the development process.
Defect Prevention

 The purpose of Defect Prevention is to identify the Root cause of
 defects and prevent them from recurring.

 This involves analyzing defects that were encountered in the past
 and taking specific actions to prevent the occurrence of those types
 of defects in the future.

 It also enhances the Productivity.

 It Reduces rework effort.
Impact of Defects at Later Stage:

                        Phase V/s Cost
        100
         90
         80
         70
         60
 Cost




         50
         40
         30
         20
         10
          0
              Design   Implementation     Testing   Maintenance

                                  Phase
Methods of Defect Preventions

  Reviews & Inspections: Self-Review, Peer Review &
  Inspections.
  Walkthroughs: prototyping of the actual design that gives the
  you the basic idea of the product functionality along with its look
  & feel.
  Defect Logging and Documentation.: provide key parameters
  that supports Defect Analysis and Measurements.
  Root Cause Analysis.
    Pareto Analysis.
    Fishbone Analysis.
Targeting Process Improvement

                      Defect
                   Identification




       Process                         Defect
     Improvement                    Classification




      Preventive                       Defect
       actions                        Analysis




                   Root Cause
                    Analysis
Pareto Analysis (80/20 Analysis):
      140                                                                             100
                                                                                                Count
             120                                                                      90
      120
                                                                                                Cumlative
                                                                                      80        Percent
      100                                                                             70

  C                                                                                   60
  o    80
  u                     65                                                            50    %
  n    60
  t                                                                                   40
                                    42
       40                                                                             30

                                              21                                      20
                                                           18
       20                                                         14
                                                                             11       10

        0                                                                             0
            Coding   Inadequate   Design   Framework Lack of  Thirdparty   Lack of
             Issue       req       Issue      Issue Knowledge   Issue      Training

                                                   Categories
Fishbone Analysis
Output of Defect Prevention Method

Category Observations                                 Conclusion
             1. Lack of Domain knowledge.             1. Domain knowledge: Training should be given to the team members
             2. Improper Algorithm                    before starting the next phase.
             3. Developer without experience
             4. Introduction of new programming       2. Make available of trained and experienced resources for coding and
             language                                 testing
Person
                                                      3. Generally introduction of new programming language should be known
                                                      well in advance to the team and proper training should be given well in
                                                      advance.

          1. Assumption of the Requirement            1. Discuss more about the boundary of the applications and granularity of
          gathering person in the grey Area.          each requirement Using Business Analysts /Domain professionals during
          2. Ambiguity in requirement documentation   requirement elicitation.
          3. Incorrect requirement specification
          4. Wrong elicitation technique              2. Frequent communications with customer will help to know his
Requireme 5. Not enough preparation for review by     requirements.
nt        reviewers
                                                      3. A formal sign off from all Business Users who would handle the
                                                      application should be mandated before starting the design phase
Questions ?
Thank You

More Related Content

What's hot

Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)Er. Shiva K. Shrestha
 
Testing concepts ppt
Testing concepts pptTesting concepts ppt
Testing concepts pptRathna Priya
 
A Research Study on importance of Testing and Quality Assurance in Software D...
A Research Study on importance of Testing and Quality Assurance in Software D...A Research Study on importance of Testing and Quality Assurance in Software D...
A Research Study on importance of Testing and Quality Assurance in Software D...Sehrish Asif
 
SRS(software requirement specification)
SRS(software requirement specification)SRS(software requirement specification)
SRS(software requirement specification)Akash Kumar Dhameja
 
Software Testing and Quality Assurance (Error, Bug, Fault)
Software Testing and Quality Assurance (Error, Bug, Fault)Software Testing and Quality Assurance (Error, Bug, Fault)
Software Testing and Quality Assurance (Error, Bug, Fault)Yogesh Late
 
Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9koolkampus
 
11 Ways To Improve Software Quality
11 Ways To Improve Software Quality11 Ways To Improve Software Quality
11 Ways To Improve Software QualityForceBolt
 
Case tools(computer Aided software Engineering)
Case tools(computer Aided software Engineering)Case tools(computer Aided software Engineering)
Case tools(computer Aided software Engineering)Self-employed
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process ModelsAtul Karmyal
 
Software Testing Techniques: An Overview
Software Testing Techniques: An Overview Software Testing Techniques: An Overview
Software Testing Techniques: An Overview QA InfoTech
 
Software Testing Fundamentals
Software Testing FundamentalsSoftware Testing Fundamentals
Software Testing FundamentalsChankey Pathak
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration managementfizamustanser
 

What's hot (20)

Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)
 
Testing concepts ppt
Testing concepts pptTesting concepts ppt
Testing concepts ppt
 
A Research Study on importance of Testing and Quality Assurance in Software D...
A Research Study on importance of Testing and Quality Assurance in Software D...A Research Study on importance of Testing and Quality Assurance in Software D...
A Research Study on importance of Testing and Quality Assurance in Software D...
 
Testing web application
Testing web applicationTesting web application
Testing web application
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
SRS(software requirement specification)
SRS(software requirement specification)SRS(software requirement specification)
SRS(software requirement specification)
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
SOFTWARE TESTING
SOFTWARE TESTINGSOFTWARE TESTING
SOFTWARE TESTING
 
Software Testing and Quality Assurance (Error, Bug, Fault)
Software Testing and Quality Assurance (Error, Bug, Fault)Software Testing and Quality Assurance (Error, Bug, Fault)
Software Testing and Quality Assurance (Error, Bug, Fault)
 
Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9Formal Specification in Software Engineering SE9
Formal Specification in Software Engineering SE9
 
11 Ways To Improve Software Quality
11 Ways To Improve Software Quality11 Ways To Improve Software Quality
11 Ways To Improve Software Quality
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)
 
Case tools(computer Aided software Engineering)
Case tools(computer Aided software Engineering)Case tools(computer Aided software Engineering)
Case tools(computer Aided software Engineering)
 
Waterfall model in SDLC
Waterfall model in SDLCWaterfall model in SDLC
Waterfall model in SDLC
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Software Evolution
Software EvolutionSoftware Evolution
Software Evolution
 
Software Testing Techniques: An Overview
Software Testing Techniques: An Overview Software Testing Techniques: An Overview
Software Testing Techniques: An Overview
 
Software Testing Fundamentals
Software Testing FundamentalsSoftware Testing Fundamentals
Software Testing Fundamentals
 
Software testing
Software testing Software testing
Software testing
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 

Similar to Defect prevention

Dp and causal analysis guideline
Dp and causal analysis guidelineDp and causal analysis guideline
Dp and causal analysis guidelineM H Chandra
 
TDD sharevison team
TDD sharevison teamTDD sharevison team
TDD sharevison teamKhou Suylong
 
CMMI High Maturity Best Practices HMBP 2010: Process Performance Models:Not N...
CMMI High Maturity Best Practices HMBP 2010: Process Performance Models:Not N...CMMI High Maturity Best Practices HMBP 2010: Process Performance Models:Not N...
CMMI High Maturity Best Practices HMBP 2010: Process Performance Models:Not N...QAI
 
The right way to manage your Test Automation project
The right way to manage your Test Automation projectThe right way to manage your Test Automation project
The right way to manage your Test Automation projectLior Katz
 
Requirements & scope
Requirements & scopeRequirements & scope
Requirements & scopeCraig Brown
 
Application Security, in Six Parts (HackPra 2012)
Application Security, in Six Parts (HackPra 2012)Application Security, in Six Parts (HackPra 2012)
Application Security, in Six Parts (HackPra 2012)johnwilander
 
Achieving agility at_scale-martin_nally
Achieving agility at_scale-martin_nallyAchieving agility at_scale-martin_nally
Achieving agility at_scale-martin_nallyIBM
 
Achieving agility at_scale-martin_nally
Achieving agility at_scale-martin_nallyAchieving agility at_scale-martin_nally
Achieving agility at_scale-martin_nallyIBM
 
Achieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin NallyAchieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin NallyRoopa Nadkarni
 
A Qualitative Study on Performance Bugs (MSR 2012)
A Qualitative Study on Performance Bugs (MSR 2012)A Qualitative Study on Performance Bugs (MSR 2012)
A Qualitative Study on Performance Bugs (MSR 2012)Bram Adams
 
PSP/TSP Training Material
PSP/TSP Training MaterialPSP/TSP Training Material
PSP/TSP Training MaterialSEMP
 
Avalon Research Profile
Avalon Research ProfileAvalon Research Profile
Avalon Research ProfileAshish Jain
 
BFSI Avalon 2009
BFSI Avalon 2009BFSI Avalon 2009
BFSI Avalon 2009Ashish Jain
 
Test result abstraction
Test result abstractionTest result abstraction
Test result abstractionJohan Hoberg
 
Otto Vinter - Analysing Your Defect Data for Improvement Potential
Otto Vinter - Analysing Your Defect Data for Improvement PotentialOtto Vinter - Analysing Your Defect Data for Improvement Potential
Otto Vinter - Analysing Your Defect Data for Improvement PotentialTEST Huddle
 
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the ProblemsTakanori Suzuki
 
9 Common Validation Errors EduQuest Advisory
9 Common Validation Errors   EduQuest Advisory9 Common Validation Errors   EduQuest Advisory
9 Common Validation Errors EduQuest AdvisoryEduQuest, Inc.
 
Test-Driven Development (TDD)
Test-Driven Development (TDD)Test-Driven Development (TDD)
Test-Driven Development (TDD)Brian Rasmussen
 
Mantis Bug Tracker Certification
Mantis Bug Tracker CertificationMantis Bug Tracker Certification
Mantis Bug Tracker CertificationVskills
 

Similar to Defect prevention (20)

Dp and causal analysis guideline
Dp and causal analysis guidelineDp and causal analysis guideline
Dp and causal analysis guideline
 
TDD sharevison team
TDD sharevison teamTDD sharevison team
TDD sharevison team
 
CMMI High Maturity Best Practices HMBP 2010: Process Performance Models:Not N...
CMMI High Maturity Best Practices HMBP 2010: Process Performance Models:Not N...CMMI High Maturity Best Practices HMBP 2010: Process Performance Models:Not N...
CMMI High Maturity Best Practices HMBP 2010: Process Performance Models:Not N...
 
The right way to manage your Test Automation project
The right way to manage your Test Automation projectThe right way to manage your Test Automation project
The right way to manage your Test Automation project
 
Requirements & scope
Requirements & scopeRequirements & scope
Requirements & scope
 
Application Security, in Six Parts (HackPra 2012)
Application Security, in Six Parts (HackPra 2012)Application Security, in Six Parts (HackPra 2012)
Application Security, in Six Parts (HackPra 2012)
 
Achieving agility at_scale-martin_nally
Achieving agility at_scale-martin_nallyAchieving agility at_scale-martin_nally
Achieving agility at_scale-martin_nally
 
Achieving agility at_scale-martin_nally
Achieving agility at_scale-martin_nallyAchieving agility at_scale-martin_nally
Achieving agility at_scale-martin_nally
 
Achieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin NallyAchieving Agility At Scale - Martin Nally
Achieving Agility At Scale - Martin Nally
 
A Qualitative Study on Performance Bugs (MSR 2012)
A Qualitative Study on Performance Bugs (MSR 2012)A Qualitative Study on Performance Bugs (MSR 2012)
A Qualitative Study on Performance Bugs (MSR 2012)
 
PSP/TSP Training Material
PSP/TSP Training MaterialPSP/TSP Training Material
PSP/TSP Training Material
 
Avalon Research Profile
Avalon Research ProfileAvalon Research Profile
Avalon Research Profile
 
BFSI Avalon 2009
BFSI Avalon 2009BFSI Avalon 2009
BFSI Avalon 2009
 
Test result abstraction
Test result abstractionTest result abstraction
Test result abstraction
 
Otto Vinter - Analysing Your Defect Data for Improvement Potential
Otto Vinter - Analysing Your Defect Data for Improvement PotentialOtto Vinter - Analysing Your Defect Data for Improvement Potential
Otto Vinter - Analysing Your Defect Data for Improvement Potential
 
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
 
9 Common Validation Errors EduQuest Advisory
9 Common Validation Errors   EduQuest Advisory9 Common Validation Errors   EduQuest Advisory
9 Common Validation Errors EduQuest Advisory
 
Test-Driven Development (TDD)
Test-Driven Development (TDD)Test-Driven Development (TDD)
Test-Driven Development (TDD)
 
Testing syllabus
Testing syllabusTesting syllabus
Testing syllabus
 
Mantis Bug Tracker Certification
Mantis Bug Tracker CertificationMantis Bug Tracker Certification
Mantis Bug Tracker Certification
 

Recently uploaded

How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 

Recently uploaded (20)

How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 

Defect prevention

  • 1. Defect Prevention Reducing Costs and Enhancing Quality Vamsi Krishna P Y
  • 2. Agenda - Concepts - Why Defect Prevention? - Phase Cost Ratio - Methods of Defect Preventions - Process Improvement Workflow
  • 3. Concepts  Universal thought “Prevention is Better than Cure” applies to Software development Life cycle as well as illness in medical science.  Defects: Imperfections in software development process that would cause software to fail to meet the desired expectations”.  Misconceptions: Lots of defects would emerge during the development process. but believe that defects get injected in the beginning of the cycle and are removed through the rest of the development process.
  • 4. Defect Prevention  The purpose of Defect Prevention is to identify the Root cause of defects and prevent them from recurring.  This involves analyzing defects that were encountered in the past and taking specific actions to prevent the occurrence of those types of defects in the future.  It also enhances the Productivity.  It Reduces rework effort.
  • 5. Impact of Defects at Later Stage: Phase V/s Cost 100 90 80 70 60 Cost 50 40 30 20 10 0 Design Implementation Testing Maintenance Phase
  • 6. Methods of Defect Preventions  Reviews & Inspections: Self-Review, Peer Review & Inspections.  Walkthroughs: prototyping of the actual design that gives the you the basic idea of the product functionality along with its look & feel.  Defect Logging and Documentation.: provide key parameters that supports Defect Analysis and Measurements.  Root Cause Analysis.  Pareto Analysis.  Fishbone Analysis.
  • 7. Targeting Process Improvement Defect Identification Process Defect Improvement Classification Preventive Defect actions Analysis Root Cause Analysis
  • 8. Pareto Analysis (80/20 Analysis): 140 100 Count 120 90 120 Cumlative 80 Percent 100 70 C 60 o 80 u 65 50 % n 60 t 40 42 40 30 21 20 18 20 14 11 10 0 0 Coding Inadequate Design Framework Lack of Thirdparty Lack of Issue req Issue Issue Knowledge Issue Training Categories
  • 10. Output of Defect Prevention Method Category Observations Conclusion 1. Lack of Domain knowledge. 1. Domain knowledge: Training should be given to the team members 2. Improper Algorithm before starting the next phase. 3. Developer without experience 4. Introduction of new programming 2. Make available of trained and experienced resources for coding and language testing Person 3. Generally introduction of new programming language should be known well in advance to the team and proper training should be given well in advance. 1. Assumption of the Requirement 1. Discuss more about the boundary of the applications and granularity of gathering person in the grey Area. each requirement Using Business Analysts /Domain professionals during 2. Ambiguity in requirement documentation requirement elicitation. 3. Incorrect requirement specification 4. Wrong elicitation technique 2. Frequent communications with customer will help to know his Requireme 5. Not enough preparation for review by requirements. nt reviewers 3. A formal sign off from all Business Users who would handle the application should be mandated before starting the design phase