EP2069964A2 - Contextually analyzing data in tabular and graphical reports - Google Patents
Contextually analyzing data in tabular and graphical reportsInfo
- Publication number
- EP2069964A2 EP2069964A2 EP07842349A EP07842349A EP2069964A2 EP 2069964 A2 EP2069964 A2 EP 2069964A2 EP 07842349 A EP07842349 A EP 07842349A EP 07842349 A EP07842349 A EP 07842349A EP 2069964 A2 EP2069964 A2 EP 2069964A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- change
- data
- task
- project
- defect density
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
Definitions
- This invention relates to the enforcement of change policies in software development and related disciplines such as Computer Aided Design (CAD).
- CAD Computer Aided Design
- policies to govern all aspects of the process. This is typically done to protect code quality and the organization' s intellectual property. These policies commonly include items such as (1) who can check- in, merge, branch or check-out code from what codelines at various stages of the development process; (2) what kinds of changes (new features, critical bug fixes, etc.) are allowed at various stages of the development process; and (3) what level of review is required for changes into codelines in the various stages of the development process.
- Management oversight usually involves systems that include only very basic access controls to source control systems. In other words, these systems are typically all or nothing in nature: either allowing all authorized users to make changes at a given time or preventing all changes by any user. These simple measures do not allow organizations to automatically enforce more complicated change policies. This lack of enforcement can lead to unauthorized changes being made to sensitive work products. These unauthorized changes can (and often do) lead to system failures which can have large negative economic consequences.
- FIG. 1 is a block diagram that illustrates an example operating environment for techniques described herein, according to one embodiment
- FIG. 2 is a flow diagram that illustrates a process for enforcing policies, according to one embodiment
- FIG. 3 is a flow diagram that illustrates a method for defining policy rules, according to one embodiment
- FIG. 4 is a block diagram that illustrates a system upon which embodiments of the invention may be implemented.
- FIG. 5 is an example data set that is used to facilitate an explanation of embodiments of the invention.
- FIG. 6 is a simple report displaying all bugs by operating system and priority
- FIGS. 7 A and 7B are block diagrams that illustrate a two step menu list that allows a user to two new dimensions for a new report
- FIG. 8 is a block diagram that illustrates a report that would be generated if a user selects Product by Assigned to as dimensions from the menu, according to an embodiment of the invention
- FIG. 9a and 9b are block diagrams that illustrate how valid dimensions would be displayed if a user chose to analyze the issues in an overall total cell, according to an embodiment of the invention.
- FIG. 10 is a block diagram illustrating a report that would result from selecting reporter by assigned to, according to an embodiment of the invention.
- FIG. 11 is a block diagram of a system configured to track and analyze defect density by source file, according to an embodiment of the invention.
- FIG. 12 is a block diagram of process flow for capturing, validating and recording the files changed by task, according to an embodiment of the invention
- FIG. 13 illustrates a simple example of the raw data
- FIG. 14 illustrates a possible report output format, according to an embodiment of the invention.
- FIG. 15 is a block diagram of a system that may be used for capturing, validating and recording effort levels, according to an embodiment of the invention.
- FIG. 16 is flowchart illustrating a process flow for capturing, validating and recording effort levels, according to an embodiment of the invention.
- FIG. 17A is block diagram illustrating a Screen Capture showing a form template inserted in CVS notepad checkin dialog box.
- FIG. 17B is a block diagram illustrating a Screen Capture showing a form template inserted in CVS Eclipse checkin dialog box.
- mechanisms provide a simple but highly effective way to automatically enforce policies that control access to code based on the status of a project. These mechanisms allows users to define and enforce those policies at any time during the software development process.
- the software development process can also be referred to in terms of a lifecycle. Virtually every software development project goes through a project lifecycle. While different organizations use different terms and different numbers of states to define a project lifecycle, most organizations define a lifecycle that begins with formal specification requirements and ends when the software project is decommissioned.
- a simple, but not atypical, lifecycle of a software project might consist of the following 7 stages: (1) requirements gathering, (2) active development, (3) code complete, (4) code freeze, (5) beta testing, (6) production, and (7) end-of-life.
- a project lifecycle may also include other or different stages.
- policies for what kinds of changes are allowed and by whom. For example, developers assigned to a project may be able to check-in changes at any time during the active development phase. While developers not assigned to the project are restricted from checking-in any changes to the project. As another example, during a code complete phase a policy may be enforced that only allows changes that are meant to fix bugs. As a third example, during a code freeze phase a policy may be implemented so that only changes to bugs of a certain priority level are allowed and, even then, all changes may need to be reviewed by a technical lead before being submitted. [0028] While the above examples are representative of the types of policies used during software development, the actual policies can be much more complex.
- mechanisms automatically enforce policies by providing a way to map physical source control system codelines to projects and a way to maintain current project and codeline state information.
- mechanisms provide a way to define change management rules and policies, as well as, ways to evaluate and allow or deny each proposed change against the defined change policy.
- FIG. 1 is a block diagram that illustrates example system 100 that performs techniques described herein, according to one embodiment.
- system 100 may include a different set of tools and components.
- system 100 includes Policy Enforcement tool 101 that works with Source Control Management (SCM) system 110 and Issue Tracking system 120.
- SCM Source Control Management
- An SCM system, such as SCM system 110, can also be referred to as software change management systems.
- Popular examples of SCM systems include but are not limited to CVS, PVCS, and Perforce.
- SCM system 110 in one embodiment, is designed to capture, store and manage access to and provide version control for software source files, designs, and similar files. This information can be stored by SCM system 110 in a repository such as SCM Store 111.
- SCM Store 111 can be a standard database that maintains information and files related to a software development project. Alternatively, it may be some other type of repository.
- SCM system 100 also may include the basic facilities to allow or deny changes to files during the software development process.
- Policy Enforcement tool 101 can extends the facilities of SCM system 100 to enforce more sophisticated change policies (for example, those based on codeline state).
- Policy Enforcement tool 101 can include a variety of components. Those components can include Change Capture component 102, Policy Evaluation and Enforcement component 103, Policy Database 104, and a set of Policy Definition and Administration components 105, 106, 107.
- Policy Enforcement tool 101 may include a different set of tools and components.
- Policy Enforcement tool 101 and its components may be implemented in a variety of ways.
- Policy Enforcement tool 101 may be a stand-alone program that includes application programming interface files to implement the various component tasks.
- Policy Enforcement tool 101 and/or its components may be implemented as dynamic link library files, as separate applications, or as integrated components, for example, of an SCM system.
- Change Capture component 102 interacts with SCM system 110.
- Change Capture component 102 intercepts proposed changes submitted by users to SCM system 110. From the intercepted data, Change Capture component 102 can capture any required information related to the proposed change (e.g., issue ID, or feature Id or enhancement ID) and can, in one embodiment, send a request to Policy Evaluation and Enforcement component 103 to approve the proposed change (e.g., by passing along all relevant details of the proposed change). Eventually, Change Capture component 102 receives a response from Policy Evaluation and Enforcement component 103 either accepting or rejecting the request.
- any required information related to the proposed change e.g., issue ID, or feature Id or enhancement ID
- Policy Evaluation and Enforcement component 103 can, in one embodiment, send a request to Policy Evaluation and Enforcement component 103 to approve the proposed change (e.g., by passing along all relevant details of the proposed change).
- Policy Evaluation and Enforcement component 103 e.g., by passing along all relevant details of the proposed change.
- Change Capture component 102 can either accept the proposed change or allow it to proceed into the SCM system or Change Capture component 102 can reject it and provide the user with an appropriate error message.
- Policy Evaluation and Enforcement component 103 evaluates the proposed change against defined policy enforcement rules. Generally, a proposed change comes as input from Change Capture component 102, but in other embodiments, the proposed change may come from an alternative source. After receiving a proposed change, Policy Evaluation and Enforcement component 103, in one embodiment, retrieves the relevant rule set and other information from Policy Database 104 in order to determine if the proposed change should be accepted.
- Policy Evaluation and Enforcement component 103 can also communicate with the Issue Tracking System 120 to validate information gathered by Capture Change component 102 (e.g., issue IDs) and retrieve other relevant information needed to evaluate a rule (such as issue priority).
- Policy Evaluation and Enforcement component 103 may use well-known and widely implemented methods for the real-time evaluation of multiple rules.
- Policy Evaluation and Enforcement component 103 may include a rules engine which has the capability to process and evaluate rules defined in a standard format.
- the set of Policy Definition and Rule Administration components 105, 106, 107 include those components that allow a software development process administrator to define and manage policies, codelines, and user-related information. According to one embodiment, the information defined by these components is stored in a Policy Database 104.
- Policy Database 104 stores policy rules, codeline mappings, as well as, user, group and role information. Policy Database 104 may be implemented using an industry standard relational database management system (RDBMS), although other implementations (e.g., tables, arrays, text files, etc.) would work as well.
- RDBMS relational database management system
- Issue Tracking System 120 can include Issue Tracking Databases 121, which can be a repository that stores known issues related to the software being developed.
- Issue Tracking System 120 is used to record and track both tasks that need to be completed for a project as well as open bugs and issues. Common examples of these systems include, but need not be limited to Bugzilla and Team Track.
- the system maps a physical source system codeline to projects, as well as, defines and maintains the state of these projects and what users or groups are assigned to these projects.
- Sample Appl V3 which is made up of three modules (modulel, module2, and module3).
- the other project is "Sample App2 V6.1”, which consists of four modules (module4, module5, module ⁇ , and module7).
- Sample Appl V3 is in the "development” phase and Sample App2 V6.1 is in the "Code Freeze” phase.
- Team 1 is assigned to Sample Appl V3 and Team 2 is assigned to Sample App2 V6.1.
- Table 1 - PROJECT DATA STORED IN AN SCM SYSTEM [0040]
- State is a foreign key reference to a table of valid states
- Assigned Users is a foreign key reference to a table of valid users and groups.
- Other likely variables such as a unique project identifier, a project description, a project owner, and other project metadata have been omitted since they are not referred to in this example.
- system 100 Based on the information stored in Table 1, when a change is submitted to the system, in one embodiment, the system determines what release/project this particular file belongs to and then checks the current state for that codeline. Based on that determination, system 100, as described herein, can invoke the appropriate set of policies to accept or reject submitted changes.
- a change management policy consists of the following types of information: (1) a specified type of change that is being requested (e.g., check-in of a particular file or merge of two codelines); (2) a set of variables about the proposed change (e.g., what codeline is being changed, its state, who is making the change etc.); (3) a set of actions that can be taken for each type of change (e.g., accept, reject, notify etc.); and (4) a set of rules that combine the above 3 items to evaluate and process changes.
- a specified type of change that is being requested e.g., check-in of a particular file or merge of two codelines
- a set of variables about the proposed change e.g., what codeline is being changed, its state, who is making the change etc.
- a set of actions that can be taken for each type of change e.g., accept, reject, notify etc.
- defining a change management policy includes first defining what types of changes trigger a rule.
- the changes that could trigger a rule include but are not limited to the following types of changes: (1) check-ins to an SCM system, (2) codeline merges in the SCM system, (3) branching in the SCM system, (4) check-outs from the SCM system, (5) downgrading or deferring of bugs in the bug system, and (6) closing of bugs in the bug system.
- a wide range of variables can be used to help evaluate the proposed change.
- variables can include but are not limited to: (1) the user, the user's role (e.g., manager, tech lead, junior programmer etc.), or the group membership of the person attempting to take the action; (2) the product or release the user is attempting to modify; (3) the state of the product or release the user is attempting to modify; (4) a valid work item ID in the issue/bug tracking system; (5) the priority of the work item / bug ID in the issue tracking system; (6) a valid reviewer ID; (7) a valid effort level entry; (8) information about whether a proposed change has passed automated quality assessment tests; (9) arbitrary Boolean operations on any data captured from the source SCM, bug-tracking or other system; (10) the size of the proposed change measured in terms of the # of lines of code changed; (11) the complexity of the code changes as measured by a code analysis tool; and (12) attributes on the particular module changes such
- a change management policy might include a wide range of output actions.
- the output actions may need to be defined by the administrator so that proposed changes can occur. These actions can include, but are not limited to: (1) allow the change to proceed, (2) reject the change, (3) notify one or more people of the change, and (4) trigger an action on an external system such as the execution of a automated test suite or automated code analysis. In this way, the administrator can control how and when proposed changes occur. In other embodiments, a different set of supported actions may be defined.
- the change policy rules can be expressed using a variety of well known methods ranging from Boolean expressions to XML-based rules definition languages.
- Example Rule 1 expressed as a simple Boolean expression that says that check-ins (the change) to "development” state codelines must have a valid taskID (the variables) or they will be rejected (the action):
- a change policy definition may include other or different information and/or be in another or different format.
- FIG. 2 is a flowchart that outlines process 200 that illustrates how a change policy is evaluated and enforced.
- Process 200 begins at step 210 with a developer submitting one or more proposed changes to an SCM system, such as SCM system 110 illustrated in FIG. 1.
- SCM system 110 illustrated in FIG. 1.
- the proposed change is submitted, information is captured from the proposed request in order to evaluate whether the change can proceed or not.
- the information necessary to evaluate the proposed change includes determining an action (e.g., check- in, merge, etc.) in addition to a set of variables (e.g., files changed, user, taskID etc.).
- This information (and other information) is captured as part of the evaluation process.
- the determination can as to what type of action is being made can be determined, in one embodiment, by the SCM system or alternatively by a Policy Enforcement tool.
- the type of change being requested is generally implicit in the action the user is requesting be taken by the SCM system.
- the type of change being requested can be automatically captured by the system based on the request of the user.
- Other information can be captured as well. For example, a user submitting a change may have to be authenticated by the SCM system before a change can be submitted. Accordingly, the userID of the requesting user can be automatically captured by the system.
- This information as well as other variables, such as the names of files being changed, can also be automatically captured by the system as part of the normal change process.
- variable data such as the taskID or reviewerID
- variable data may be input directly by the user or the user might be prompted to input the data.
- some variables such as codeline state can be retrieved from the Policy, User and Group DB. Note that other variables and how those variables are obtained can vary from one implementation to the next.
- the system sends the captured information (e.g., what files were changed, the userID, the issue ID) to a policy enforcement module.
- the proposed change in one embodiment, is not committed to the SCM system at this time, but is held in an "in-process" state.
- the policy enforcement module receives the proposed changes.
- the system retrieves information in order to be able to evaluate the proposed change and determine if it will be allowed. For example, as discussed above in connection with FIG. 1, the following types of information may be retrieved to evaluate a proposed change: (1) the codeline in which the files with proposed changes reside (this information may be retrieved from a Policy, User and Codeline database); (2) the current status for this codeline (e.g., whether the codeline is in development, code-freeze, production etc.); (3) the project assignments for the developer requesting the change from the Policy, User and Codeline DB; and (4) the priority of the issueID from the Issue Tracking system.
- the policy enforcement tool identifies policy rules which have been defined for the current state of the codeline the developer is attempting to modify.
- the codeline is in a "code-freeze" state. Accordingly, the following rules may be retrieved from the DB: (1) only developers assigned to this project are allowed to check-in changes; (2) only changes for "high priority” issues are allowed; and (3) all other changes are rejected.
- the system evaluates whether the proposed change should be accepted. It does so by comparing the information it retrieved to the rules defined for the current codeline and codeline state. If the change violates any of the rules specified the change is rejected. In addition, the process can terminate and/or an error message may be displayed to the user. If the change does not violate any rules, the system accepts the change and "commits" it to the system.
- the details (e.g., the time, date, user, bugID, files changed etc.) of the change are recorded, for example, in a Policy, Codeline, and User and DB to track all changes made to the project.
- FIG. 3 is a flowchart that outlines process 300 for defining a set of policy rules. This process can be performed through a user interface that provides selectable controls that correspond to various rules options or the administrator may define the rules using text, markup text, a template, or some other means.
- process 300 begins with an administrator specifying the list (or at least a partial list) of release components that might be included in the next release (or update) of a project.
- the list of release components can be a table in an SCM system, a record in a database, a text file, or some other mechanism that can be used to identify release components.
- the manner of the administrator uses to identify these components varies, for example, version numbers, file names, file metadata, header information, and other such mechanisms may all be used to identify the components.
- step 320 for each component in the set, the administrator provides metadata such as the name and description of each component, as well as, a "branch" in the SCM system where the files for this component can be located. In this way, the administrator can customize what information is searched for by the various systems and components described herein.
- the administrator chooses the appropriate state the release is in from a set of defined choices.
- the release may be in a "code-freeze” state, "development” state, etc.
- the administrator is defining when a proposed change may be submitted to an SCM system.
- the administrator defines which users or groups of users are assigned to this release. In this way, the administrator can control who accesses release files at the various stages of a project's lifecycle.
- steps discussed above are described as occurring in a particular order. These steps may occur in any order. They may also occur independently of any other steps.
- defining rules properly may include performing more or less than the steps enumerated above.
- FIG. 4 is a block diagram that illustrates a computer system 400 upon which an embodiment of the invention may be implemented.
- Computer system 400 includes a bus 402 or other communication mechanism for communicating information, and a processor 404 coupled with bus 402 for processing information.
- Computer system 400 also includes a main memory 406, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 402 for storing information and instructions to be executed by processor 404.
- Main memory 406 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 404.
- Computer system 400 further includes a read only memory (ROM) 408 or other static storage device coupled to bus 402 for storing static information and instructions for processor 404.
- ROM read only memory
- a storage device 410 such as a magnetic disk or optical disk, is provided and coupled to bus 402 for storing information and instructions.
- Computer system 400 may be coupled via bus 402 to a display 412, such as a cathode ray tube (CRT), for displaying information to a computer user.
- An input device 414 is coupled to bus 402 for communicating information and command selections to processor 404.
- cursor control 416 is Another type of user input device, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 404 and for controlling cursor movement on display 412.
- This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
- the invention is related to the use of computer system 400 for implementing the techniques described herein. According to one implementation of the invention, those techniques are performed by computer system 400 in response to processor 404 executing one or more sequences of one or more instructions contained in main memory 406. Such instructions may be read into main memory 406 from another machine-readable medium, such as storage device 410. Execution of the sequences of instructions contained in main memory 406 causes processor 404 to perform the process steps described herein. In alternative implementations, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, implementations of the invention are not limited to any specific combination of hardware circuitry and software.
- Non-volatile media includes, for example, optical or magnetic disks, such as storage device 410.
- Volatile media includes dynamic memory, such as main memory 406.
- Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 402.
- Transmission media can also take the form of acoustic or light waves, such as those generated during radio- wave and infra-red data communications. All such media must be tangible to enable the instructions carried by the media to be detected by a physical mechanism that reads the instructions into a machine.
- Machine -readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD- ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
- Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 404 for execution.
- the instructions may initially be carried on a magnetic disk of a remote computer.
- the remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem.
- a modem local to computer system 400 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal.
- An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 402.
- Bus 402 carries the data to main memory 406, from which processor 404 retrieves and executes the instructions.
- Computer system 400 also includes a communication interface 418 coupled to bus 402.
- Communication interface 418 provides a two-way data communication coupling to a network link 420 that is connected to a local network 422.
- communication interface 418 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line.
- ISDN integrated services digital network
- communication interface 418 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
- LAN local area network
- Wireless links may also be implemented.
- communication interface 418 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
- Network link 420 typically provides data communication through one or more networks to other data devices.
- network link 420 may provide a connection through local network 422 to a host computer 424 or to data equipment operated by an Internet Service Provider (ISP) 426.
- ISP 426 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the "Internet" 428.
- Internet 428 uses electrical, electromagnetic or optical signals that carry digital data streams.
- the signals through the various networks and the signals on network link 420 and through communication interface 418, which carry the digital data to and from computer system 400, are exemplary forms of carrier waves transporting the information.
- Computer system 400 can send messages and receive data, including program code, through the network(s), network link 420 and communication interface 418.
- a server 430 might transmit a requested code for an application program through Internet 428, ISP 426, local network 422 and communication interface 418.
- the received code may be executed by processor 404 as it is received, and/or stored in storage device 410, or other non-volatile storage for later execution. In this manner, computer system 400 may obtain application code in the form of a carrier wave.
- FIGS. 5-8 illustrate how the Pivot Point method works with a very simple data set related to bugs in a software development setting.
- Software bugs were used for the example data set since it is likely familiar to most professionals working in software field.
- the approach described works independently of the kind of data being reported upon and could just as easily apply to virtually any data set.
- Figure 6 is a simple report displaying all bugs by operating system and priority. Notice the "pivot" icon next to each cell.
- a "right click” menu (a menu displayed when clicking the right or secondary mouse button in a standard graphical user interface) on the data element itself could also be used instead of the icon.
- the system automatically gives the user the ability to select two new dimension for the new report on this subset of the data. This list of dimensions is automatically filtered by the data point in question. In this example, "Priority" is not shown as a valid dimension for further analysis.
- Figure 8 shows the report that would be generated if the user had selected
- Figure 10 shows the report that would result from selecting reporter by assigned to. Notice once again that the data set automatically filtered to the four issues in question.
- defects are tracked and analyzed in "bug tracking” or "task tracking” systems.
- defects When defects are entered into the system they are generally tracked and analyzed on such variables as, product version, platform, defect severity, and date entered.
- defects When defects are fixed, the defect tracking system is updated to change the status of the defect to resolved or closed. A short explanation or comment about the cause of the defect and the changes made to fix it are typically captured.
- These defect tracking systems are independent of the source control system which contains the actual work product (such as software code source code, design documents etc.) in question. As a result there is no correlation between the actual changes made to fix the defect and the information recorded in the defect tracking system. This lack of correlation between the defect tracked in the defect tracking system and the physical changes made to the source work product in the source control system presents many problems including:
- Defect density is the number of distinct defects which required changes to be made (to fix the defect) to a particular file or module in a given period of time.
- This metric is very useful for identifying the most critical areas of weakness of the system and hence the areas where additional investment/action may be taken. For example, this metric can be used to prioritize the area in which unit tests should be written, for which additional automated system tests should be written, or which project should be undertaken to re-write the error prone file or module to improve its quality and maintainability.
- Defect density is the number of distinct defects which required changes to be made (to fix the defect) to a particular file or module in a given period of time.
- the relevant defect tracking-ID from the defect tracking system is captured.
- This defect ID is validated against the defect tracking system to ensure it corresponds to a valid, open defect. If the defect ID is valid the check-in is allowed to proceed, if not it is rejected.
- reports can now be generated which count the # of defects per source file/module over time. This defect density report can then be analyzed to determine which files/modules are most defects prone and whether the defect rate for a given file/module is increasing or decreasing over time. This data is very useful and can be used as a basis for quality assurance test prioritization and other corrective actions.
- Figure #11 illustrates the major components of a system configured to perform the techniques described herein, and the relationship between those components and existing systems.
- the techniques described herein are designed to work with existing Source Control Management (SCM) systems ( Figure #11 (a) & Q). These systems are sometimes also referred to as software change management systems.
- SCM systems include but are not limited to CVS, PVCS, and Perforce.
- SCM systems are designed to capture, store and manage access and provide version control for software source files, designs and similar files.
- SCM systems have basic facilities to allow or deny changes, the invention extends these facilities to enforce sophisticated change policies based on codeline state.
- the Policy Administration Component ( Figure #11 (d,e,f) allows the administrator to define and manage the Code Line Mapping and manage valid data ranges and userIDs for authorized users.
- the information defined in this component is stored in the Policy DB ( Figure #ll(g)).
- the Policy DB ( Figure #11 (g)) stores the codeline mapping and related information along with the names and userIDs of authorized users.
- This DB would typically be implemented using an industry standard relational database management system (RDBMS), although other implementations would be acceptable.
- RDBMS industry standard relational database management system
- the invention is designed to work with existing Issue Tracking Systems and Issue Tracking Databases ( Figure #11 (h, i)). These systems are used to record and track both tasks that need to be completed for a project as well as open bugs and issues. Common examples of these systems include, but need not be limited to Bugzilla and Team Track.
- sample Appl V3 which is made up of three modules (moduleA, moduleB, moduleC) and another called “Sample App2 V6.1” consisting of four modules (moduleD, moduleE, moduleF and moduleG).
- Sample Appl V3 is in the "development” phase and Sample App2 V6.1 is in the "Code Freeze” phase.
- Team 1 is assigned to Sample Appl V3 and Team 2 is assigned to Sample App2 V6.1.
- the source SCM system is organized by module, with each module having its own path and each project having its own branch. The table below shows the minimal data that would be captured for this example:
- Branch Path Prefix /depot/p1 Branch Path Prefix /depot/p2
- Figure #12 outlines the process flow for capturing, validating and recording the files changed by task using the components described above. The process begins with the developer submitting the proposed change(s) to the source control system (figure #12, (a))-
- a key requirement for effectively managing software development and similar projects is the ability to track effort level information (i.e. how many hours were spent on performing the activity) for a particular task or activity. This information is critical in assessing whether a project is on schedule and is often used to determine the cost and/or billing of a particular project.
- Tasks are entered into a common task or issue tracking system. As part of this process each task is assigned a unique identifier.
- a "call-out" is added to the source control management system which captures the effort level and task ID associated with the proposed change.
- the data entered is validated to ensure that the task ID is valid and that the effort entered is within a valid range.
- Figure #15 illustrates the major components of a system designed to implement the techniques described herein.
- FIG. 15 also illustrates the relationship between those components and existing systems.
- a system that implements the techniques described herein may work with existing Source Control Management (SCM) systems ( Figure #15 (a) & (j). These systems are sometimes also referred to as software change management systems.
- SCM systems include but are not limited to CVS, PVCS, Clear Case, Accurev, Subversion and Perforce.
- SCM systems are designed to capture, store and manage access and provide version control for software source files, designs and similar files.
- SCM systems have basic facilities to allow or deny changes, the invention extends these facilities to capture effort and related task information as part of the routine change management process.
- the Change Capture component ( Figure #15 (b)) intercepts proposed changes in the SCM system and captures the required effort and task information related to the proposed change, "calls out” to the Data Validation Component ( Figure #15 (c)) passing along all relevant details of the proposed change and receives the response from the Data Validation Component (accept, reject etc.).
- the change control component inserts a template into the SCM system commit form to allow users to enter appropriate information.
- a sample screen capture of the form template is show in figures 3a (form template in notepad editor) and 3b (form template in eclipse)
- the Change Capture component either allows the proposed change to proceed into the SCM system or rejects it and provides the user with an appropriate error message.
- the Data Validation component validates that the task ID is valid and that the hours entered are within an acceptable range. It takes input from the Change Capture components, retrieves the valid data ranges and other information from the Policy DB ( Figure #15(g)). It can also call out to the Issue Tracking System to validate Issue IDs or retrieve relevant information.
- Figure #16 outlines the process flow for capturing, validating and recording the effort level by task evaluating using the components described above. The process begins with the developer submitting the proposed change(s) to the source control system (figure #16, (a)).
- the Data Validation Component receives the proposed changes (figure #16, (c))
- the program retrieves the information necessary and validates that the taskID is valid (by querying the issue tracking system) and that the effort entered is within the valid range (by retrieving this range from the Policy DB).
- Figure 17b is a block diagram illustrating a Screen Capture showing a form template inserted in CVS Eclipse checkin dialog box.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Stored Programmes (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US84430906P | 2006-09-12 | 2006-09-12 | |
| US11/852,952 US8645906B2 (en) | 2006-09-12 | 2007-09-10 | Method for enforcing change policy based on project state |
| US11/853,778 US7873676B2 (en) | 2006-09-12 | 2007-09-11 | Contextually analyzing data in tabular and graphical reports |
| US11/853,782 US8645907B2 (en) | 2006-09-12 | 2007-09-11 | Capturing effort level by task upon check-in to source control management system |
| US11/853,780 US9047164B2 (en) | 2006-09-12 | 2007-09-11 | Calculating defect density by file and source module |
| PCT/US2007/078293 WO2008033939A2 (en) | 2006-09-12 | 2007-09-12 | Contextually analyzing data in tabular and graphical reports |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP2069964A2 true EP2069964A2 (en) | 2009-06-17 |
| EP2069964A4 EP2069964A4 (en) | 2010-02-03 |
Family
ID=39184557
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP07842349A Withdrawn EP2069964A4 (en) | 2006-09-12 | 2007-09-12 | Contextually analyzing data in tabular and graphical reports |
Country Status (2)
| Country | Link |
|---|---|
| EP (1) | EP2069964A4 (en) |
| WO (1) | WO2008033939A2 (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111382989B (en) * | 2018-12-28 | 2024-01-26 | 上海汽车集团股份有限公司 | Data processing methods and devices |
| JP7702830B2 (en) * | 2021-08-05 | 2025-07-04 | 株式会社日立製作所 | Policy evaluation system, policy evaluation method and program |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0394331A (en) * | 1989-09-07 | 1991-04-19 | Toshiba Corp | Device for controlling advancing state of software development |
| JPH05216651A (en) * | 1992-02-05 | 1993-08-27 | Hitachi Ltd | Program quality evaluation system |
| JPH05233238A (en) * | 1992-02-20 | 1993-09-10 | Nec Corp | Software maintenance resource management system |
| US20020059294A1 (en) * | 1998-01-30 | 2002-05-16 | Sandro Bottarelli | Method and apparatus for elaborating and representing data analysis in a decision support system |
| JP2006065521A (en) * | 2004-08-26 | 2006-03-09 | Matsushita Electric Ind Co Ltd | Process change support apparatus and method |
-
2007
- 2007-09-12 WO PCT/US2007/078293 patent/WO2008033939A2/en not_active Ceased
- 2007-09-12 EP EP07842349A patent/EP2069964A4/en not_active Withdrawn
Non-Patent Citations (2)
| Title |
|---|
| No further relevant documents disclosed * |
| See also references of WO2008033939A2 * |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2008033939A2 (en) | 2008-03-20 |
| EP2069964A4 (en) | 2010-02-03 |
| WO2008033939A3 (en) | 2008-05-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9047164B2 (en) | Calculating defect density by file and source module | |
| US8645906B2 (en) | Method for enforcing change policy based on project state | |
| US12153629B1 (en) | Systems and user interfaces for dynamic and interactive table generation and editing based on automatic traversal of complex data structures and incorporation of metadata mapped to the complex data structures | |
| US8645907B2 (en) | Capturing effort level by task upon check-in to source control management system | |
| US10956665B1 (en) | Systems and user interfaces for dynamic and interactive table generation and editing based on automatic traversal of complex data structures in a distributed system architecture | |
| US7926026B2 (en) | Graphical analysis to detect process object anomalies | |
| CN107810500B (en) | Data quality analysis | |
| US9244899B1 (en) | Systems and user interfaces for dynamic and interactive table generation and editing based on automatic traversal of complex data structures including time varying attributes | |
| JP5306360B2 (en) | Method and system for analysis of systems for matching data records | |
| US7861227B2 (en) | Software development environment with design specification validation tool | |
| US8229775B2 (en) | Processing of provenance data for automatic discovery of enterprise process information | |
| Vassiliadis | Data warehouse modeling and quality issues | |
| US20040098299A1 (en) | System and method for determining performance level capabilities in view of predetermined model criteria | |
| US20110321124A1 (en) | Enterprise Evidence Repository | |
| US20080208918A1 (en) | Efficient data handling representations | |
| US11256557B1 (en) | Efficient processing of rule-based computing workflows | |
| CN112527774A (en) | Data center building method and system and storage medium | |
| CA2673422C (en) | Software for facet classification and information management | |
| WO1993012488A1 (en) | Measurement analysis software system and method | |
| US10853741B2 (en) | Information governance platform | |
| CN120563062A (en) | Task progress processing method, device, equipment and medium | |
| Senator | Ongoing management and application of discovered knowledge in a large regulatory organization: a case study of the use and impact of NASD Regulation's Advanced Detection System (RADS) | |
| US20090070743A1 (en) | System and method for analyzing software applications | |
| US10078806B2 (en) | Business process model analyzer and runtime selector | |
| JP5510031B2 (en) | Information security management support method and apparatus |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20090409 |
|
| AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL BA HR MK RS |
|
| DAX | Request for extension of the european patent (deleted) | ||
| A4 | Supplementary search report drawn up and despatched |
Effective date: 20100107 |
|
| REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1132060 Country of ref document: HK |
|
| 17Q | First examination report despatched |
Effective date: 20100414 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20190402 |