Popular Agile Testing Metrics and KPIs and How to Use Them

Cumulative flow diagramAgile test metrics and KPIs are measurements that enable Agile teams to assess how effective their software tests are and whether their testing efforts help achieve specific business objectives. An important aim of Agile software testing is to get testing up to speed with development—metrics and KPIs can assess the efficacy of the Agile testing team in this context.

In this article, you'll find out about the important difference between a metric and a KPI, and why you need to distinguish between the two. You'll also get some examples of KPIs and metrics relevant to Agile software testing efforts. Finally, you'll learn exactly how KPIs and metrics can lead to overall improvement in software testing within an Agile framework in addition to understanding some important measuring pitfalls..

Data Integration: ETL or ELT?

Data integration: ETL vs ELTModern enterprises gather data from many disparate sources, including social media, websites, customer databases (CRM systems, sales records etc), customer support systems, and HR software.

Merely collecting lots of data isn't useful in itself—it's the insights you get from such data that can drive more informed business decisions. This post aims to teach you about the bedrock processes required for obtaining insights from your data—ETL and ELT.

We'll begin by discussing data integration, before moving on to two vital forms of data integration—ETL and ELT. When you're finished reading, you'll fully understand what ETL and ELT are, and which process is better suited to your business in terms of getting actionable insights from different data sources..  

Data Warehouse Security Best Practices

DWH securityData warehouse security is vital for organizations that take the huge step of collating all their important data in one place. Unauthorized access to data warehouses can have devastating consequences, ranging from compromised customer information to exposing of high-level business intelligence that gives an enterprise its competitive advantage.

This article introduces warehouse security, discusses some of the challenges involved in securing a data warehouse, and offers some best practices for data warehouse security, including the use of FIPS 140-2 certified software and hardware..

How to use Openquery to make a join between a SSAS cube and a table from any other database

Connetion to SSAS instanceImagine you need a report with data from an OLAP sales cube, and have to include data from a table of the relational data source, or from an external database.

With a linked server you can construct a MDX query in the SQLServer instance where you have the cube, joining with an external database to complete the data with information from tables of the relational database..

How to change in SQL Server the key column to an identity by using T-SQL and OVER clause

Relational model with invoices master-detailIf you have to change the type of a key column on SQL Server, and the new column type has to be integer, and even identity, you can do it by using some criteria in order to get the rows ordered (PK= index clustered= order by in physical disk by this column)..

We will change the type of the PK column of a table in a sample with 2 typical invoice tables master-detail where the key columns are nchar. 'invheader.invoiceid' is the primary key of the master table and 'invlines.lineid' is the primary key of the detail table..

 

How to recover the password of the user sa on SQL Server

Init params con SQL Server Configuration ManagerWith SQL Server, when we forget or we lose the password of the DBA user 'sa', and we are the administrators of the database, we have a little problem.

It's easy to forget this password because probably we have our own user administrator and don't use to log in with the sa account. We also could have inherited the administration of a SQL Server database, with any documentation about the sa account or we coul'd have installed a database and deleted the login with admin privileges without knowing the password of the sa user.

For all this situations there is a better solution than reinstalling the database..

Review "Learning Hadoop "

Learning Hadoop 2 book

With almost 350 pages, 'Learning Hadoop 2', I was very pleasantly surprised!

This is a book that chapter by chapter, provides a guide with the appropriate depth in the apprenticeship of this technology, which is today one of the most flourishing. It has a lot of examples that we can execute and analyze..