DIGITAL ASSET MANAGEMENT SYSTEM - QUALITY ASSURANCE TESTING
With the overwhelming response they got in the initial week of agreement, the Client Firm defied the hesitant approach of trying the independent QA testing services. They started with a small monthly assignment just to see how it could help them – the encouraging results from our expert QA team made them feel safe and they extended the business relation. Thus the supposed monthly trial ended up in a relationship of over 24 months! A dedicated team of 5 test engineers with a QA Lead were involved in the Project, working simultaneously with the Client Side development team. The service from our high potential enterprising team, the zestful thought “Constructive Ways to destruct an Application” and a combination of various testing techniques including Manual and Automated services helped us to make the product very stable with logging about 2500 bugs for 2 products. The tests were carried on Cross Platform (WIN XP, 2000 server, Vista, Mac OS X etc), Cross Browser (IE 6, 7, FF 2x, 3x, safari etc), including the Web and Desktop environment.
About our Client
Client: A Photography Services Firm
A product with a lot of business potential but without any planned QA cycle made the client worried with hundreds of calls from unsatisfied customers every day. This made them realize that their baby needed to be doctored. That is when they planned to outsource the project for testing. And as opportunity knocks the doors at right times, they were contacted by Mindfire at the same time, which turned out to be a success mantra for one of the finest product we have seen down the line.
Connected with RSA Secure keys, used Hardware Dongles for license certificate files for the products, and worked over a shared environment with our test lab. The Applications were developed using C#, C++, .Net , Java. The Configuration files contained the setting details of the applications, so customizing Layouts, setting up the appearance, search filters, print catalogues and a lot other features were manipulated by editing the configuration files.
The Application data such as Meta Data, files/ folder details, their sharing permissions, locations etc were stored in XML files which can be manipulated.