AI Accelerated Quality -PRO
Checklists
Test Coverage Method
Software Clearing Methods and Tools
Pre-Requisites
Requirements Engineering Workflow
Product Management
Planning / Project Management
Product and Solution Security
Process Compliance
OWASP Top 10
Automations
Python
Technologies & Tooling
tools
infra
research
Hacker News
About
Framework
Supervisor
Home
Repository
Checklists
Test Coverage Method
Software Clearing Methods and Tools
Pre-Requisites
Requirements Engineering Workflow
Product Management
Planning / Project Management
Product and Solution Security
Process Compliance
OWASP Top 10
Automations
Python
Kubernates, garafana, promethus, postman Linux agents,Load testingPerformance testingScaling test
Form Filling, asserting page objects, screen-shot capturing, user-interactivity cases - Headless Chrome automation with Selenium
Shell, killerkoda, docker, kubernates, remote vs-code
Pytest (Flask backend automation),gitlab,docker-compose, Traefik
Playwright,Typescript, Nodejs, express, gitlab, docker, swagger
Shell,C, Python, Linux / Ubuntu OS Runtime,Docker, Github actions
Selenium Resources
Application Security
Gettings all images over a webpage
Open Source and Closed Source AI Agents
OpenAI chat APIs integration with React App
About
Author
Contact
More Apps
Settings
About
Theme
Theme
Dark
Light
Night
Cupcake
Bumblebee
Corporate
Synthwave
Retro
Valentine
Halloween
Aqua
Lofi
Fantasy
Dracula
Data
Delete All
Close
Test Coverage Method
Create Product and System Test Design
Create SW Test Design (Standard)
Create SW Test Design and Test Cases (CS)
Perform Module Test (Standard)
Perform Pre-Integration Testing (Standard)
Perform SW Integration Tests (CS)
View Full Checklist ➜
Software Clearing Methods and Tools
Collect all OEM/SP Requirements
Create SW High Level Design (Standard)
Evaluate Technology Feasibility
Specify Architecture and High Level Designs
Third Party Software Components Evaluation & Planning
Update Product and System Architecture
Verify Third Party Software Components Compliance
View Full Checklist ➜
Pre-Requisites
Project Notebook Startup Version
Process Variant determined and Tailoring
View Full Checklist ➜
Requirements Engineering Workflow
Analyze Competition
Perform Positioning
Analyze Market Opportunities
Identify Requirements
Define User Scenarios
Specify customer Benefits
Analyze Customers
Benchmark competition
Create Service Concept
View Full Checklist ➜
Product Management
Project Summary created
Phase in Roadmap created
Product Manager is nominated
View Full Checklist ➜
Planning / Project Management
A Project Leader is nominated.
A Project Quality Manager is nominated.
A Project Architect is nominated
Disable Automatic Loading of Remote Content
Start-up version of Planning Document
All required QA activities for the next phase are planned and given in the project planning.
Requirements for project team members have been specified
View Full Checklist ➜
Product and Solution Security
Only Use Fully End-to-End Encrypted Messengers
Collect all OEM/SP Requirements
Identify, Analyze and Specify Product Line Enhancements
Substantiate and Rank Requirements
Create Product and System Test Design
Create Product and System Test Plan
Create SW Detailed Design (Standard)
Create SW High Level Design (Standard)
Define SW Development Infrastructure (Standard)
Specify Product Line Enhancements
Specify SW Detailed Design (CS)
Update Product and System Architecture
Update and Maintain System Architecture
Implement Software (CS)
Implement Software (Standard)
Perform Incremental Product Test
Perform Incremental System Test
Perform Penetration Testing (Standard)
Perform Product Security Threat and Risk Analysis
Perform Product Test
Perform System Test
Update Overall Test Plan
Monitor and Handle Security Vulnerabilities
Incident Handling
Provide Architecture Coaching
Perform PSS Project Classification (Standard)
Third Party Software Components Evaluation & Planning
View Full Checklist ➜
Process Compliance
Secure your Account
Check Privacy Settings
Think of All Interactions as Public
Think of All Interactions as Permanent
Don't Reveal too Much
Be Careful what you Upload
Don't Share Email or Phone Number
Don't Grant Unnecessary Permissions
Be Careful of 3rd-Party Integrations
Avoid Publishing Geo Data while still Onsite
Remove metadata before uploading media
Implement Image Cloaking
Consider Spoofing GPS in home vicinity
Consider False Information
Don’t have any social media accounts
View Full Checklist ➜
OWASP Top 10
Destroy Sensitive Documents
Opt-Out of Public Records
Watermark Documents
Don't Reveal Info on Inbound Calls
Stay Alert
Secure Perimeter
Physically Secure Devices
Keep Devices Out of Direct Sight
Protect your PIN
Check for Skimmers
Protect your Home Address
Use a PIN, Not Biometrics
Reduce exposure to CCTV
Anti-Facial Recognition Clothing
Reduce Night Vision Exposure
Protect your DNA
View Full Checklist ➜