Feeds

Mathematical approaches to managing defects

Radical new approaches toward software testing needed?

Top 5 reasons to deploy VMware with Tegile

Summary

It would appear that computer science is ready to move software development to a new level, so that the idea of software development becomes more of an engineering practice than a black art – although we could equally well have said that at any time in the last 20 years or so.

However, there are still numerous practical problems to overcome. Formal methods require a level of expertise that is missing from many development shops. The range of problems that the techniques have been applied to is also limited – embedded systems, by their nature, represent a limited universe compared to a highly distributed environment with a feature rich user interface. Similarly, the Bayesian approach to testing and defect prediction shows great promise; but to date the work has not been generally applied.

However, without more rigorous, one could say more scientific, approaches, the problems of defective software are unlikely to disappear. And, adoption of these new approaches will need management buy-in to technology risk management.

Research undertaken for HP Services with 10 per cent of the top 250 FTSE companies some years ago has shown that IT risk management is starting to became a board-level concern, perhaps following on from the Y2K debacle; although the IT director still has specific responsibility for this.

The definition of IT risk amongst those sampled is quite discriminating: "We wouldn't really regard it as IT risk...we'd regard it as information security risk or systems development risk," according to one manager.

Nevertheless, although management does now often take responsibility for technology risk management overall, it appears, anecdotally, that the board may not always be fully aware of the risks associated with the lack of adequate testing. This may sometimes limit management support for the radical new approaches that could help address these risks. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.