How to Leverage Exploratory Testing to Uncover Bugs
March 08, 2023

Rob Mason
Applause

Share this

Development teams so often find themselves rushing to get a release out on time. When it comes time for testing, the software works fine in the lab. But, when it's released, customers report a bunch of bugs. How does this happen? Why weren't the flaws found in QA?

Welcome to defect fatigue, a common issue that occurs when testers execute the same repetitive automated and manual tests and as a result, skip over or miss defects. Testers need to get creative and investigative to find these well-hidden defects before they slip past QA and into the hands of customers.

Be an Investigator and Break Things

The purpose of exploratory testing is to find defects by breaking application functionality using manual and automated techniques without repetition. The "without repetition" piece is key, and the idea is that teams test to break, rather than confirm. Testers should manipulate connectivity, security, configuration settings, and different user navigation, among others. Other techniques include:

■ creating mind maps to find testing areas to investigate

■ forcing the application to function outside the known paths

■ triggering unexpected errors to discover missing error messaging paths

■ exercising back-end processing and third-party software integrations to see what can be interrupted or failed by unexpected user actions

If an application supports different user roles, testing should be done from these different perspectives and with their respective settings. Testers can also utilize existing browser development tools to find errors that are not always visible in the application UI, and to test and edit to see how the application responds.

Consider the People Element

Testers are also people that use applications every day. They should draw on their own personal experiences with typical application defects to try and break functionality. They should also consider the habits and behaviors of the members of the software development team.

As developers and product managers work more with an application over time, they start to develop habits that may influence how they interact with the software. For example, some developers may only develop code on a local machine while others may only do code reviews instead of pre-testing in a test environment. These are work habits that can lead to defects. On the product side, many product managers habitually create user stories and requirements in the same way, unintentionally leaving out a relevant workflow or configuration setting.

Finding hidden defects requires testing against the grain rather than verifying a function performs as expected. It also requires testing all possible paths that customers might take. Crowdtesting can supplement existing techniques by using real people to serve as proxies for customers. They can test for quality, user-experience and functionality outside the lab, and provide instant, useful feedback.

Testing repeatedly only to have bugs unearthed later by customers is a frustrating and potentially costly endeavor. When testers mix existing techniques with creativity and an understanding of human behavior, they will be able to dig deeper to find bugs and friction points that ultimately improve quality and customer experience before release.

Rob Mason is CTO of Applause
Share this

The Latest

March 18, 2024

Gartner has highlighted the top trends that will impact technology providers in 2024: Generative AI (GenAI) is dominating the technical and product agenda of nearly every tech provider ...

March 15, 2024

In MEAN TIME TO INSIGHT Episode 4 - Part 1, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses artificial intelligence and network management ...

March 14, 2024

The integration and maintenance of AI-enabled Software as a Service (SaaS) applications have emerged as pivotal points in enterprise AI implementation strategies, offering both significant challenges and promising benefits. Despite the enthusiasm surrounding AI's potential impact, the reality of its implementation presents hurdles. Currently, over 90% of enterprises are grappling with limitations in integrating AI into their tech stack ...

March 13, 2024

In the intricate landscape of IT infrastructure, one critical component often relegated to the back burner is Active Directory (AD) forest recovery — an oversight with costly consequences ...

March 12, 2024

eBPF is a technology that allows users to run custom programs inside the Linux kernel, which changes the behavior of the kernel and makes execution up to 10x faster(link is external) and more efficient for key parts of what makes our computing lives work. That includes observability, networking and security ...

March 11, 2024

Data mesh, an increasingly important decentralized approach to data architecture and organizational design, focuses on treating data as a product, emphasizing domain-oriented data ownership, self-service tools and federated governance. The 2024 State of the Data Lakehouse report from Dremio presents evidence of the growing adoption of data mesh architectures in enterprises ... The report highlights that the drive towards data mesh is increasingly becoming a business strategy to enhance agility and speed in problem-solving and innovation ...

March 07, 2024
In this digital era, consumers prefer a seamless user experience, and here, the significance of performance testing cannot be overstated. Application performance testing is essential in ensuring that your software products, websites, or other related systems operate seamlessly under varying conditions. However, the cost of poor performance extends beyond technical glitches and slow load times; it can directly affect customer satisfaction and brand reputation. Understand the tangible and intangible consequences of poor application performance and how it can affect your business ...
March 06, 2024

Too much traffic can crash a website ... That stampede of traffic is even more horrifying when it's part of a malicious denial of service attack ... These attacks are becoming more common, more sophisticated and increasingly tied to ransomware-style demands. So it's no wonder that the threat of DDoS remains one of the many things that keep IT and marketing leaders up at night ...

March 05, 2024

Today, applications serve as the backbone of businesses, and therefore, ensuring optimal performance has never been more critical. This is where application performance monitoring (APM) emerges as an indispensable tool, empowering organizations to safeguard their applications proactively, match user expectations, and drive growth. But APM is not without its challenges. Choosing to implement APM is a path that's not easily realized, even if it offers great benefits. This blog deals with the potential hurdles that may manifest when you actualize your APM strategy in your IT application environment ...

March 04, 2024

This year's Super Bowl drew in viewership of nearly 124 million viewers and made history as the most-watched live broadcast event since the 1969 moon landing. To support this spike in viewership, streaming companies like YouTube TV, Hulu and Paramount+ began preparing their IT infrastructure months in advance to ensure an exceptional viewer experience without outages or major interruptions. New Relic conducted a survey to understand the importance of a seamless viewing experience and the impact of outages during major streaming events such as the Super Bowl ...