Home

ISO 26262 – The Second Edition: what’s in it… and what isn’t

Test And Verification Services Blog - Wed, 18/04/2018 - 07:45

Carmakers are steadily integrating higher volumes of automated driving features into road vehicles, making functional safety a top priority for their whole industry.This article highlights how to handle the development of autonomous vehicles and outlines the next edition of ISO26262 standard which includes a lot of upgrades, eliminates the weight limit, and thereby expand its coverage to other vehicle categories, including heavier road cars, trucks, busses, and motorcycles.

Read More

Find out how T&VS offer a range of services to help companies working to adopt the ISO26262 standard.

The post ISO 26262 – The Second Edition: what’s in it… and what isn’t appeared first on T&VS.

Categories: Software Testing

Cloud Performance Testing: How to Build an Effective Strategy?

Test And Verification Services Blog - Wed, 18/04/2018 - 07:37

With the increase in the number of cloud-based applications, there is a rise in the number of users as well. There are various resources for computing and storage for the applications and critical to measuring the application’s performance on the cloud. Performance is something that directly affects the user experience. This article highlights how to build an effective strategy for cloud performance testing.

Read More

Know how T&VS ensure you implement and deliver the right performance testing approach to help you meet your objectives and business demands.

The post Cloud Performance Testing: How to Build an Effective Strategy? appeared first on T&VS.

Categories: Software Testing

Built-In Security for Auto Chips

Test And Verification Services Blog - Wed, 18/04/2018 - 07:32

Security concerns continue to grow in the automotive world, just as they do in other markets where the value of data is increasing. The automotive industry is taking these concerns very seriously, however, and the impact is being felt across the supply chain. This article from Semiengineering outlines the importance of cybersecurity in automobiles and describes why it is necessary to enable everyone in the value chainfrom chip manufacturers to device developersto implement security successfully for auto chips.

Read More

Learn more about how T&VS Automotive Verification and Test solutions help to address the challenges of delivering safe, secure and compliant automotive products.

The post Built-In Security for Auto Chips appeared first on T&VS.

Categories: Software Testing

Challenges and changes: A look at today’s healthcare IoT

Test And Verification Services Blog - Wed, 18/04/2018 - 07:28

In recent years, the IoT has drastically improving patient care in the healthcare industry. These devices are allowing doctors and treatment facilities to track real-time data feedback more intensely than ever.However, these innovations can also pose a significant risk to enterprise security efforts. This article highlights why has healthcare struggling to make IoT safe and describes the key tips that you can use to improve program protections in the healthcare industry.

Read More

Learn more about how T&VS IoT driven connected healthcare services can help organizations innovate and improve patient satisfaction and boost treatment outcomes.

The post Challenges and changes: A look at today’s healthcare IoT appeared first on T&VS.

Categories: Software Testing

When Product Management Goes Wrong – Part 5 – the Dread Pirate Roberts

Jonathan Kohl - Tue, 17/04/2018 - 17:54

In part 1 of this series, we looked at the underminer product manager. In part 2 we talked about the dinosaur. In part 3, we looked at the erratic driver. In part 4, we will looked at the micromanager.

The Dread Pirate Roberts manager threatens people in a misguided attempt to motivate them.

This is the final post in this series on product management anti-patterns. While it seems outrageous, and maybe amusing, I can assure you it is not the least bit funny to the people who suffer under it.

SPOILER ALERT.

In the book (and movie adaptation) The Princess Bride, there is a character called The Dread Pirate Roberts. Another character, Westley, is captured by the Dread Pirate Roberts. Every night, the Dread Pirate Roberts says to him: “Goodnight, Westley. Good work, sleep well, I’ll most likely kill you in the morning.” The Dread Pirate Roberts never does kill him, but this goes on for three years.

END SPOILER.

Dread Pirate Roberts

 

The character in the movie is fantastic and likeable, but it is so memorable that I have named this particular anti-pattern after it.

There are some product managers who feel like this pattern is a good one to repeat. “Can’t let people get too comfortable, and there is nothing like a threat to motivate them, right?” Well no, fear is a terrible motivator. You’ll get a minimal level of compliance, but you will not motivate people at all. In fact, you’ll do the opposite and demotivate people.

Here is an example.

I was helping a software company with some process tuning and advisory work. I would drop in for a couple of days a week and help them with whatever came up. They had created a new team to work on emerging technology, and they worked independently from everyone else on a brand new product line. It was an experiment to try to jolt some new thinking into a company that was resting on past success a bit too much. They had assembled a young, inexperienced but highly talented and motivated development team. They also had communications, marketing, PR and visual designers from the rest of the company working on the same floor. The office was in a gorgeous brick building that was a former factory and it was warm and inviting. The team used an open environment that practiced hot desking, meaning no one had assigned space. You arrived, plugged in your laptop into a docking station, and claimed that space for your own that day. The next day, someone else might be sitting there, and you would find an alternative.

The development team had staked their claim on one side of the office and found it more productive to sit together. They would pair, diagram, brainstorm or play with nerf guns or have foosball tournaments to ease some stress. The marketing, sales and PR folks claimed another area on the other side of the office. The kitchen was closer to them, and they laid claim to a couple of vintage arcade games for stress release. Everything else in between was a free for all. There was a bit of an empty gap between the teams, but they tended to sit closer or further away depending on what they were working on, and there was a lot of positive energy and good natured joking.

One day that all changed for the worse.

I walked into the office that morning and instantly felt tension and stress. Heads were down, conversations were short and hushed, and the product owner had stopped working in the dev area and set up shop on the other side with the marketing ands sales people. The visual designer dragged herself into the office, clearly fighting the flu. Normally she would have spent the day in bed or worked from home. There was nowhere else to sit, so with reluctance, she set up near the developers. A mountain of kleenexes began to build around her and there were copious amounts of hand sanitizer being used by by everyone else. She looked nervous and afraid.

When the daily standup started, the individual reports were short, guarded and the usual joking and camaraderie was completely absent.

The product manager had returned that morning from a two week trip out of town visit various client sites, and it became clear that they had done something to throw off the teams. Whatever they had done was clearly having a negative effect on productivity. The build server was quiet and when I checked the feed for source control, there wasn’t the usual pace of checkins. When I checked the productivity software, stories weren’t moving through the process like usual.

This was odd because they were self-organizing team with strong DevOps practice and they usually pushed several builds to a staging server every day. There was at least one production push per week that included bug fixes, new features and other things that customers and stakeholders were interested in.

Over the next couple of weeks, there were no pushes to production. I monitored source control and build machines, and found code check-ins to have slowed down considerably. The quality of conversations on new designs lacked the creativity that they did before, and the product owner would only show up briefly to clarify or discuss an issue, then would scurry back to the other side of the building. Everyone got sick because they were stressed and working too much, and they would struggle to work from home, or drag themselves in to meetings.

I couldn’t get much out of anyone other than “Talk to the product manager”, so I made sure to track him down. I asked what was going on and that I had noticed some changes with the team. He explained that senior managers weren’t happy with the team’s productivity, so he called a team meeting and threatened them. He told the team that he had picked each of them for this project, and he could easily get rid of them and replace them with other people who were coming off of other projects in the company, or hire new people. He had created this team and he wasn’t afraid of tearing it down and starting over if they didn’t start working faster.

“Are they afraid for their jobs” I asked?

“They should be.”

Wow.

You can imagine my reaction. I tried to be calm and not ask if he was ****ing crazy, and if he really wanted the product to fail. Well, I did say it, but in much more diplomatic terms. The product manager told me he was directed by senior management to “put the fear of God in the team” and they wouldn’t relent. They understood it was killing productivity and it had a negative effect, but they were doing what they were told.

The product manager felt the approach was drastic, but appropriate. When I also talked with senior management, they said they had no intention of letting people go, but if they feared for their jobs, they would work harder. No matter that people were so stressed out now that they were getting sick, no matter that productivity had plummeted, no matter that some team members weren’t even hiding the fact they were looking for new jobs, no matter that the development team had packed their belongings in boxes, waiting for the inevitable tap on the shoulder from HR. Productivity cratered, and people did get some work done, but the creativity, off the wall and amazing solutions disappeared. I left the project. As you can imagine, it didn’t succeed. They created a weak imitation of their competitors’ offerings and it went nowhere. People left the project and most eventually left the company for more suitable arrangements.

If you feel a constant threat hanging over you, you are going to feel fearful and not at your best. In fact, it is a form of abuse. People will respond to abuse in non-deterministic ways. ie. you have no idea how they will react, but it won’t be good for the individuals, the team, the product or the company.

Threats and fear are tools that will enforce some level of outward compliance, but they are terrible motivators. Managers who think that they will increase productivity or get products or features out the door faster if they use empty threats are abusing their colleagues. Much like in the movie The Princess Bride, they may feel a sense of control and justify using empty threats. That was a movie though, in real life, pirate behaviour is abuse at best, and criminal at worst.

The Dread Pirate Roberts:

  • Makes threats, either explicit or implicit
  • Never follows through on said threats
  • Believes in antiquated management theory (ie. that fear is a good motivator)
  • Manipulates people to get their way
  • Changes their mind all the time so you never feel like you can make them happy
  • May deny making the threats when confronted, expecting you to doubt your own version of events. (Also known as gaslighting.)
  • Is likely a psychopath, or is directed by one

In another case, I witnessed an accidental Dread Pirate Roberts, but the outcome was the same: demoralized staff who weren’t as productive as they could be.

I had worked with the CTO of a rapidly growing startup at a couple of other organizations. We weren’t close, but we had mutual respect for each other. He told me that their product teams needed some help, but wanted to make sure there was a good fit with me and the VP of Product at his current venture. The VP of Product was a big, good natured man, with full sleeve tattoos and a shaved head with a large beard. He looked intimidating, even though he was kind hearted. He played up the look, wearing black t-shirts, work boots and a wallet on a chain. He joked that he was the king hipster of the company. He had a loud voice and a loud laugh, and because he had a nagging shoulder injury, he frequently crossed his arms when talking or listening.

The office, like many software companies, was dog friendly, and he brought his Rottweiler in to work every day. The dog was quiet and would stare at people. Since it didn’t have much of a tail, it was hard to tell if it was happy or not. It silently followed him around. It was an intimidating creature, especially if you weren’t used to dogs.

Prior to working at this company, I had heard rumours of this “big biker type VP” who would walk around the office with his dog yelling at people. I chalked it up to campfire project horror stories that programmers tell to scare each other. When I met with him and other leaders, I didn’t find him intimidating at all. He was open minded, kind hearted and quick to laugh.

It seemed like a good fit, so I was brought in initially to help with User Experience (UX.) The UX folks had done a fantastic job, but the VP of Product had decided to forgo usability testing prior to shipping. The CTO asked me to come in and do an expert review and a heuristic evaluation. My work product was a report, and I made a few recommendations. I was careful to back up all the recommendations with at least two citations from UX experts. The team UX loved the report, but I was a bit concerned when a nervous CTO told me to be careful, the VP of Product might need to be “treated delicately”.

The next morning, the VP of Product marched into my office, with his dog right behind him. His huge frame filled my doorway, and he threw a printed copy of my report on my desk and started yelling at me. His dog peered from behind him, and it felt like the dog was scowling at me too. Picture in your mind of a large, slightly heavyset man with a trucker hat, large framed glasses, Harley Davidson t-shirt, full sleeve tattoos on both his crossed arms yelling at you. Not to mention both he and his large, intimidating dog are blocking your only exit.

The horror stories were true! I was witnessing it in person. I could hardly believe it and I almost burst out laughing at the absurdity of it.

I can’t remember everything he said, but I got the gist of it: my report was garbage and he was going to rip up my contract and send me on my way. Once I got over my initial shock, I told him that his behavior was unacceptable, and I wasn’t going to put up with it. That escalated the situation, so I invited him in (so he wasn’t blocking my exit) and I asked if he would sit down. He declined, but he did at least come in to the office and loom over me. I was rescued by a call on his mobile, (which he took and talked at length in front of me) and that seemed to calm him down. When he returned to me, I distracted him by asking about his tattoos. Eventually, we found some common ground, had an awkward conversation about tattoos and then he picked up the report he had thrown on my desk and walked out. The dog gave me a look over its shoulder as it trotted after him. I almost felt like it was trying to get in the last word and give me one last scolding.

I immediately walked to the CTO’s office and told him what happened and that behavior was completely inappropriate. I said I would not work in an environment like this. He agreed, and asked what we should do. I said we needed to meet with the VP of Product and see if there was a way we could deal with conflict in a more healthy way.

The next morning I met with both the CTO and a contrite VP of Product. We explained how his behavior was intimidating, and that the threats, no matter how empty they might be, were distressing and abusive. We also explained that having his dog around while he behaved like this made it the situation worse. It was bad enough for us dog lovers. People from cultures that aren’t obsessed with dogs like North Americans are found it absolutely terrifying. He was shocked and visibly upset. He said he knew he had a temper problem, and that he was working on it. He said he had become angry because he felt that my feedback had criticized the product, and it was his heart and soul, so he felt personally threatened. When we explained that my job was to help the product be better, and not to tear anything down, and I asked if there was anything I could do to help with delivering the information so it felt less threatening. He said he had over reacted, apologized and asked for help.

As we talked, he told us that his father was a successful entrepreneur, and was a big “Theory X Management” believer. He felt that employees are inherently lazy, and need proper motivation to work for you. In his father’s factory, in another era, it had worked. Software companies tend to be egalitarian, and technical people prefer meritocracies. Theory Y management works well in knowledge fields, where you assume people are intrinsically motivated, and with proper encouragement will work hard and thrive. He mimicked his father’s management style, and when you combined that with his large size, loud speaking, intimidating mannerisms (not to mention his large, intimidating sidekick dog), he tended to get his own way a lot.

He was asked to leave his dog at home for a while during office hours, and to not behave aggressively because of the way it made team members feel. If he felt threatened or angry, the CTO said to come into his office and talk to or yell at him first, if needed.

At first there was a dramatic improvement, and he really tried hard to adjust and grow personally. Eventually, he was able to bring the dog back to the office, but didn’t bring the dog with him to meetings or when he wanted to confront someone.

I would love to tell you that this story had a happy ending, but it doesn’t. Even though he said the right things, and seemed to sincerely want our help, he quickly grew to resent it. As time went on, the behavior came back as his attitude soured. He had trouble taking responsibility for his actions, and while he would feel terrible at first, he would say that people knew that he didn’t mean it when he threatened them. He was eventually forced out of the company, and it took a terrible toll on him afterwards. This was a case of someone really needing to grow up, it didn’t seem like the behavior was intentional. His motivations aside, the company rightfully saw him as a liability, and got rid of him. Sadly “the Veep with the dog who yells at people” story was spread by every employee who left the company. (And for a while, there were a lot of people who did.)

I don’t have much to say about how to deal with the Dread Pirate Roberts product manager, other than to run away when you encounter it. Unlike the movie (or book by Goldman), I have yet to witness a happy ending. (Sorry for the spoiler.) I have seen this sort of abuse many times, and it never ends well for anyone. If you’re a product manager and you ever feel the need to threaten someone, don’t. Just don’t. Stop yourself and do something to distract yourself to get yourself under control. Take a walk. Count to ten. Drink a glass of water. Go home for the day and collect your thoughts. Get some counselling and take a course on managing people. It is abuse and you should never do it, even if directed by someone else. It isn’t worth the cost to the person you threaten, and you’ll eventually destroy yourself and your reputation.

Categories: Software Testing

Emulation Outside the Box

Test And Verification Services Blog - Tue, 17/04/2018 - 07:26

This article from Semiwiki explores how the emulation system bridges the verification productivity gap to accelerate verification of SoCs, subsystems, and IP blocks, as well as system-level validation.

Read More

Find out how T&VS Hardware Emulation services allow verifying the robustness of a design and helps optimize the design for improved performance.

The post Emulation Outside the Box appeared first on T&VS.

Categories: Software Testing

5 Different Software Testing Methods

Test And Verification Services Blog - Tue, 17/04/2018 - 07:21

Software testing methodologies are the different approaches and ways of ensuring that a software application in particular is fully tested. This article focuses on key types of testing methods and delve into every single one to have a deeper understanding of the huge software testing picture.

Read More

Find out how T&VS Software Testing services help you to establish a cost-effective software testing facility that delivers improved quality, reduces risks and time-to market.

The post 5 Different Software Testing Methods appeared first on T&VS.

Categories: Software Testing

Web Application Security Fundamentals: Intrusion Prevention and Penetration Testing

Test And Verification Services Blog - Tue, 17/04/2018 - 07:13

The first two steps in detecting and preventing web application security threats are intrusion prevention and penetration testing. They are both broad terms describing application security practices used to mitigate attacks and block new threats.With web assets constantly under threat from malicious malware and various threat agents, web application security is a key area for the business. This article explores the role of intrusion prevention and penetration testing which helps businesses avoid today’s threats and vulnerabilities.

Read More

Understand how T&VS Penetration Testing services help you protect & defend against latest and future attacks and maintain compliance, eliminate IT security threats, & can reveal how hackers may breach systems.

The post Web Application Security Fundamentals: Intrusion Prevention and Penetration Testing appeared first on T&VS.

Categories: Software Testing

The incredible opportunities and risks of the Internet of Things

Test And Verification Services Blog - Tue, 17/04/2018 - 07:06

The IoT is promising a whole new market of opportunities and there is growing awareness of its potential challenges. Until we have a clearer understanding of these risks, we must rely on programmed testing to develop knowledge and to support overall security. This article highlights what are most significant risks that need to be aware of with the movement toward an IoT environment and describes what the future holds for the IoT and the opportunities.

Read More

Find out how T&VS IoT services helps to build a foundation of trust, security and safety in the Industrial IoT devices.

The post The incredible opportunities and risks of the Internet of Things appeared first on T&VS.

Categories: Software Testing

T&VS Receives Industry’s First Certification for Cadence Perspec System Verifier

Test And Verification Services Blog - Mon, 16/04/2018 - 06:00

Cadence Connections Verification Alliance Certification Program Equips T&VS to Expertly Guide Adoption of Perspec System Verifier, Improving SoC Verification Efficiency

perspec system verifierApril 16, 2018, Bristol, UK – Test and Verification Solutions (T&VS), a leading hardware verification and software testing solutions provider, today announced its successful completion of the Cadence® Connections Verification Alliance certification program for Cadence Perspec™ System Verifier and is offering the industry’s first adoption services. The offering includes expert advice to reduce the time for users to adopt and proliferate the Cadence Perspec System Verifier and improve their overall SoC test generation productivity. T&VS has a long history of working on complex test and stimulus projects and combines their deep understanding of abstraction and reuse with the skills that their engineers have acquired in the Cadence certification program.

As system-on-chip (SoC) products become more complex and market windows continue to shrink, any increase in verification efficiency translates directly into a competitive advantage. By adopting the new generation of tools such as Persec System Verifier and the right level of abstraction, SoC developers can meet the challenges of validating performance, function and power while avoiding the manual effort and time spent developing complex system-level coverage driven SoC tests.

“Portable stimulus enables an important step to achieving improved verification efficiency through improved abstraction and reuse, both project to project and across platforms,” said Mike Bartley, T&VS CEO and Founder. “Through our collaboration with Cadence, our fully trained teams are equipped to provide expert, independent advice that helps customers quickly get up and running with the Cadence Perspec System Verifier tool to realize the benefits that it and portable stimulus have to offer.”

As a leader in test and verification, T&VS has been working closely with Cadence and others in the Accellera Portable Stimulus Working Group, closely tracking its development and standardization.

“The verification complexity of modern SoCs is creating a lot of customer demand for the Perspec System Verifier within the Cadence Verification Suite,” said Michal Siwinski, vice president of product engineering and management, System and Verification Group at Cadence. “Test and Verification Solutions has played an important role in Cadence’s worldwide verification ecosystem, and their expertise in verification, abstraction and reuse is beneficial for our customers using Perspec for their design projects.”

Portable Stimulus and the Reuse Revolution – Perspec System Verifier

T&VS and Cadence recently collaborated to publish a white paper that brings together the input of an expert user and a senior solutions architect to provide a complete picture of the challenges that PSS was designed to address. The paper is based on a cache verification example and details the solution paradigm delivered, and the benefits users can expect when applying PSS-based tools such as Cadence Perspec System Verifier.

Delivering on the Promises of Portable Stimulus

Mike Bartley, T&VS founder and CEO will be presenting the paper “Delivering on the promises of Portable Stimulus” at forthcoming Cadence CDNLive EMEA user conferences. In the paper, Mike will focus on the reuse of SV UVM and how to achieve real shift left through reuse – from SoC to IP level.

  • CDN Live EMEA – May 7-9, 2018 (Munich, Germany)
About T&VS

T&VS (Test and Verification Solutions Ltd) was formed in 2008 and marked its 10-year anniversary on February 28, 2018.

T&VS provides services and products to organisations developing complex products in the microelectronics and embedded systems industries. Such organisations use T&VS to verify their hardware and software products, employ industry best practice and manage peaks in development and testing programmes. T&VS’ embedded software testing services includes onsite/offshore testing support including assistance with safety certification and security testing. T&VS hardware verification services include onsite/offshore verification support and training in advanced verification methodologies. T&VS also offers Verification IPs and its own Verification (EDA) signoff tool.

T&VS Company Contact
  • Dr. Mike Bartley – T&VS
  • +44 7796 307958
  • mike@testandverification.com

The post T&VS Receives Industry’s First Certification for Cadence Perspec System Verifier appeared first on T&VS.

Categories: Software Testing

Do Testers Need Bugs?

James Thomas' blog - Sat, 14/04/2018 - 07:05
At this week's Cambridge Tester Meetup we played Questions for Testers, a card game created by James Lyndsay which is intended to "trigger conversations and build connections."

The deck consists of cards containing questions or statements with three responses. We took it in turns to read out a question or statement and the others quizzed us to help them decide which response they thought we'd give. Eventually they'd guess at our response, and we'd reveal it, and then talk about why we'd chosen as we did.

Stefan's choice was the one at the top: 
Bugs and testers are like ...
A. Ants and aardvarks
B. Bees and beekeepers
C. Cars and CopsQuestions, did you say? Boom! Head explosion.
  • Are we mapping bugs and testers to one of the entities in each response? 
  • Does the order of the entities matter?
  • Do they each map to just one? Could they each map to both?
  • What relationships might motivate that mapping? 
  • Does it need to be the same mapping for bugs as testers for a given response?
  • What properties do the entities in each response have?
  • What relationships do we perceive between the entities in each response?
  • What analogous relationship might there be between bugs and testers
  • ... or bugs and testers interpreted however we've mapped them to the entities in that response?
  • When choosing a response, am I evaluating all responses in the same way?
  • What way is that?
  • How is it "the same"? 
  • Does it need to be "the same"?
  • Who says so?
  • In what sense is it an evaluation anyway?
  •  ...

It was fun listening to the others ask questions and wondering what kind of hypotheses they were testing with them.

It was interesting that we didn't much discuss what we thought we were discovering by the responses given, even though there's no reason why we shouldn't have. (But the game isn't set up as a collaborative effort in that way: the rules award points to individual players, although also says they are pointless, and we weren't following the rules anyway.)

We found that asking how the reader would be approaching their answer was a very productive question: it can cut through several layers of assumption on the questioners' side.

There were lots of good questions, but my favourite was one of a series intended to test the kinds of relationships that Stefan perceived between bugs and testers:
Do testers need bugs?Do. Testers. Need. Bugs? Boom!
Categories: Software Testing

Configuring Memory Read Completions Sent by PCIe® QVIP

Test And Verification Services Blog - Fri, 13/04/2018 - 09:40

PCI Express® (PCIe) is a point-to-point serial transceiver interconnect that provides higher transfer rates, increased bandwidth, and, hence, higher performance than its precursors: PCI and PCI-X. This article explores how to configure the memory read completions sent by PCIe QVIP.

Read More

Find out how T&VS VIPs help verification engineers access to the industry’s latest protocols, interfaces and memories required to verify their SoC designs.

The post Configuring Memory Read Completions Sent by PCIe® QVIP appeared first on T&VS.

Categories: Software Testing

How to Manage Test Data in End-to-End Test Automation?

Test And Verification Services Blog - Fri, 13/04/2018 - 09:24

Test data has a key role in the software testing process to generate out the qualities or the deficiencies present in the system. Thus, it arises the need of creating and maintaining the test data in end-to-end test automation, which is not an easy task for the testing team. This article examines how to deal with the test data management in end-to-end test automation.

Read More

Find how T&VS Test Automation Services enables organisations to increase the effectiveness, efficiency, and coverage of their software testing.

The post How to Manage Test Data in End-to-End Test Automation? appeared first on T&VS.

Categories: Software Testing

Functional Safety Methodologies for Automotive Applications

Test And Verification Services Blog - Fri, 13/04/2018 - 09:10

Safety-critical automotive applications have stringent demands for functional safety and reliability. Traditionally, functional safety requirements have been managed by car manufacturers and system providers. However, with the increasing complexity of electronics involved, the responsibility of addressing functional safety is now propagating through the supply chain to semiconductor companies and design tool providers. This article describes the concepts of functional safety analysis and explains how design methodologies are capturing and addressing the new safety metrics.

Read More

Find out how T&VS Functional Safety services help you to improve the safety & security requirements in industrial applications.

The post Functional Safety Methodologies for Automotive Applications appeared first on T&VS.

Categories: Software Testing

How Does a IoT based Home Automation System Work?

Test And Verification Services Blog - Fri, 13/04/2018 - 09:03

The IoT based home automation system aims to control all the devices of your smart home through internet protocols or cloud-based computing. Thus, IoT based home automation system consist of a servers and sensors. These servers are remote servers located on internet which help you to manage and process the data without the need of personalised computers. This article examines the working of different smart devices which together constitute the home automation system.

Read More

Learn more about how T&VS IoT certification process can ensure the smart home revolution is delivering safe, secure and compliant products.

The post How Does a IoT based Home Automation System Work? appeared first on T&VS.

Categories: Software Testing

How to use the Source Code for the Book Automating and Testing a REST API

Alan Richardson's Blog - Thu, 12/04/2018 - 18:02
TLDR; download the source from github, open in IntelliJ and amend the IP address, username and password of the VM installed admin user.

I recently realised that I didn’t have a video showing how to download and use the source code for the book Automating and Testing a REST API

Rectified. Now I do.




In the video I show:
  • Visiting https://github.com/eviltester/tracksrestcasestudy
  • Download the .zip file
  • Run mvn clean test in the unzipped folder to download the dependencies
  • Open the pom.xml in IntelliJ
  • Accessing tracks from the VM
  • Change the config in TestEnvDefaults
  • Running test data setup tests in SetupTracksTestDataUtilityTest
  • And I discuss how to can resolve some common setup issues
I have also added this video to the book support page, along with all the other support videos for the book: how to install curl, how to setup the VM, using cURL, using Proxies, using Postman.
Where can I get the Book?
https://www.compendiumdev.co.uk/page/tracksrestapibook
Videohttps://youtu.be/NrDHvu5ewLo
Categories: Agile, Software Testing

How to use Test Practice Pages and Games from Evil Tester

Alan Richardson's Blog - Thu, 12/04/2018 - 17:01
TLDR; download the .jar from github, run from the command line, visit localhost:4567, navigate, play and test.

I have written a lot of apps and games over the years to support my training workshops. Most have been hosted on my web sites. Now you can download them all in one easy to use .jar file.



What?I have collated the following, into a single downloadable app:
This is not everything I have written, and it doesn’t include RestMud or my Test REST API (which I appear to have not mentioned before).

You can find the app at:
How do I use it?Download the ‘jar-with-dependencies’ file:
At the command line where you downloaded the file:

java -jar seleniumtestpages-1.1-jar-with-dependencies.jar

You should see some messages in the console that a web server has started:

> java -jar seleniumtestpages-1.1-jar-with-dependencies.jar 
[Thread-0] INFO org.eclipse.jetty.util.log - Logging initialized @354ms
[Thread-0] INFO spark.webserver.JettySparkServer - == Spark has ignited ...
[Thread-0] INFO spark.webserver.JettySparkServer - >> Listening on 0.0.0.0:4567
[Thread-0] INFO org.eclipse.jetty.server.Server - jetty-9.3.z-SNAPSHOT
[Thread-0] INFO org.eclipse.jetty.server.ServerConnector -
Started ServerConnector@2eaec02c{HTTP/1.1,[http/1.1]}{0.0.0.0:4567}
[Thread-0] INFO org.eclipse.jetty.server.Server - Started @501ms
Then using a browser visit:
You’ll see the Selenium Test Pages and at the bottom, a link to the rest of the applications
Why would I use it?From here you can play a variety of games that I use in my “Just Enough JavaScript to be Dangerous” and “Hacking JavaScript Games” training workshops:
  • Console Driver
  • The Coloured Square Game
  • Number Hover Text Game
  • The Coloured Square Changing Game
  • And more…
Also some simple apps:
  • Some test apps
    • 7 char value
    • Test with A.T.T.I.T.U.D.E
  • Some production apps
    • E-Primer
    • Evil Tester Sloganizer
    • Responsive Test Tool
    • And more…
Some of these apps have deliberate bugs, some are designed for being hacked and manipulated.
But they all offer scope for exploration and testing.
What Next?I will be adding more games and apps into the repo, and I’ll be creating some Patreon videos showing how to use the apps to practice your testing.

I’m also updating it to get ready to refresh my Selenium WebDriver training course and build some more training material.

If you have any questions then feel free to leave comments in the video or on this blog post.
Videohttps://youtu.be/6OQQEtq_7bQ

Categories: Agile, Software Testing

Verification and Validation Brothers

Test And Verification Services Blog - Thu, 12/04/2018 - 09:22

Verification and validation are independent procedures that are used together for checking that a product, service, or system meets requirements and specifications and that it fulfils its intended purpose. This article from Semiengineering describes the differences between verification and validation and outlines how both verification and validation play together in helping each other out.

Read More

Find out how T&VS Verification services help to meet the challenging requirements with respect to performance, flexibility and verify the today’s complex designs effectively.

The post Verification and Validation Brothers appeared first on T&VS.

Categories: Software Testing

Agile Environment- What It Is?

Test And Verification Services Blog - Thu, 12/04/2018 - 09:17

Agile is a revolutionary working style of the IT industry. It encourages the working team to break the entire product that they are working on into small portions so that the overall project can be developed quicker. This article explores how exactly does agile environment work and outlines the importance of agile software development lifecycle.

Read More

Find out how T&VS Software Testing services help you to establish a cost-effective software testing facility that delivers improved quality, reduces risks and time-to market.

The post Agile Environment- What It Is? appeared first on T&VS.

Categories: Software Testing

Penetration Testing Tutorial: Learn Manual & Automated Types PenTest

Test And Verification Services Blog - Thu, 12/04/2018 - 09:09

Testers should act like a real hacker and test the application or system and needs to check whether code is securely written. A penetration test will be effective if there is a well-implemented security policy. This article examines why penetration testing is required and describes the difference between manual penetration and automated penetration testing.

Read More

Understand how T&VS Penetration Testing services help you protect & defend against latest and future attacks and maintain compliance, eliminate IT security threats, & can reveal how hackers may breach systems.

The post Penetration Testing Tutorial: Learn Manual & Automated Types PenTest appeared first on T&VS.

Categories: Software Testing

Pages