Monday, December 31, 2012

Common Security Terms - More terms

In the past, I have written about some important system security terms here. Below is the enhanced list which you may find useful. See my video, Cyber Security Basic Terms and Concepts or read on...

Tuesday, September 18, 2012

Rapid Risk Identification

If you have read my earlier post on Risk Management in Software Testing , you would know that the risk management process includes Risk Identification, Risk Prioritization (or Risk Assessment) and Risk Treatment. You will now see how you can identify the relevant risks in your software testing project quickly. See my short video, How to Identify Risks? Risk Management Video or read on...
You may have seen some rapid risk identification in action already. During management reviews of projects. During my career, I have been positively surprised  many times when the management was able to identify potential problems (risks) after just listening to the project progress. In fact, risk management is a critical management skill. Other critical management skills being strategic planning, organizing and communication. If you are not management but want to identify risks in your project fast, here is what you can do.

Thursday, September 6, 2012

Data Quality and Data Quality Assurance

This post is on data quality and how to go about assuring high data quality. See my video, Data Quality Concepts (I have explained multiple examples in detail in it) or read on...

First, let us understand data quality. Put simply, data are of high quality if they do not suffer from data issues. There are many potential issues with data (see examples below). Now, data are used for a number of organizational functions such as on-going operations, dealing with customers, marketing and analysis and decision making. If the data are not of high quality, there are a number of problems. Users get incorrect reports. Time and money is wasted in miscommunication. Bad data can lead to poor decisions. It can frustrate employees and most importantly, it can frustrate customers.

Although data quality assurance is particularly useful for production databases, it can very well be used in software testing as software testers need to ensure high data quality in gold test databases. Now, let us see examples of data issues that bring down data quality. 

Thursday, August 30, 2012

Database Normalization: What to test for Third Normal Form?

In the last post, you saw the tests (based on the candidate key) that should be executed to check the second normal form (2NF). In this post, let us understand the third normal form (3NF) and the tests that should be executed to check it. View my video on Third Normal Form explained with examples or read on...

First, what is the 3NF? Just to recall, the purpose of normalization is to eliminate insertion, update and deletion anomalies. The tables in a normalized database are intuitive in design. They do not require extra query logic or application logic to query or filter the required data. Now, a table that is in 3NF is already in 2NF. Also, each non-key column depends on the candidate key and nothing else.

Now, let us understand why the following examples are not in 3NF and how to convert them to 3NF?