Originally posted by MicrosoftBob
View Post
- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
I Work With a Pedant
Collapse
X
-
Yep, I shall read that. I've also read Taleb's work on the tail risks of the highly improbable, and I try to make the connection in testing. A 'highly improbable' test case can expose a more fundamental weakness in design.And what exactly is wrong with an "ad hominem" argument? Dodgy Agent, 16-5-2014 -
Additional :
MTT, the human body is a complex thing so your example may not be a fair comparison. Always the simplest solution is the best. Perhaps they are trying to do something really, really straightforward that works in 99% of cases and meets the deadline.
No synapses, go nerve endings. Something as simple is SASGuru on a good day. Whack it and it works.
Quality, or the definition therein is relative. This pedant's idea of quality might be way over and above what is needed. Perhaps a happy medium is needed?
Why deliver the whole leg and fully articulating knee joint when a bionic spatula will do?Knock first as I might be balancing my chakras.Comment
-
Maybe edge case was the wrong term to use, especially when there are testers listening in!Originally posted by Mich the Tester View PostToo late. The role of 'edge cases' and 'borderline scenarios' is often misunderstood; it's not about what happens when some incredibly improbable set of imagined circumstances come together, but about exploring the possibilities. An edge case can expose a weakness that might actually occur in more probable circumstances. But then, if you've read about exploratory testing and systems thinking, instead of ISTQB and ISO9000 unthinking, you will know that.
It's a bit like the doctor hitting you under your knee with a rubber hammer and watching what happens. People don't hit you under the knee every day with a rubber hammer, so the test isn't to find out what happens when somebody spontaneously takes a rubber hammer and hits you, but it can give an indication that something is worth more investigation.
My advice as to how to make use of your pedant is to listen carefully to his reasoning and ask him to demonstrate on a real system how something can go wrong.
As an example, I injected some JavaScript from a server control - to do this you register the script using a unique key. In this instance I used a string literal as the key. His argument was that we should be dynamically building the key to ensure uniqueness. Well, yes it's best practice but in a piece of code that is completely self contained and will only ever inject this one script then why bother? Why introduce extra logic? It isn't going to break anything and we need to get this out the door pronto.
Another obsession of his is people on slow connections. He took time out to redesign buttons on another part of the site (for which he had no remit) to change the colour of their backgrounds while the page was loading so the user could read the button text.
Again, fair enough but the whole site is a warts and all application and his fine tuning everything is just holding us up.
Fortunately, the client is aware of this as I have his ear on this one.Comment
-
The skeletal and nervous system (below the neck) isn't really all that complex; the brain is extremely complicated, with some notable exceptions.Originally posted by suityou01 View PostAdditional :
MTT, the human body is a complex thing so your example may not be a fair comparison.And what exactly is wrong with an "ad hominem" argument? Dodgy Agent, 16-5-2014Comment
-
I took the same approach to requirements gathering for a small client recently. The resounding consensus on here was don't bring all that big company stuffed shirt mumbo jumbo into a small company as they won't appreciate it.Originally posted by Mich the Tester View PostThe skeletal and nervous system (below the neck) isn't really all that complex; the brain is extremely complicated, with some notable exceptions.
So is it possible to be just as over zealous in a testing world?
"No ma'am, the shuttle is not ready for launch as they delivered the wrong colour napkins"
Knock first as I might be balancing my chakras.Comment
-
Script can often be injected from a GUI; that can form a security risk. It's one of the basic tests that security testers execute a I understand it; I'm not a security testing expert though. Sometimes I inject bits of html or even sql in a GUI and watch what happens. Some interesting stuff here;Originally posted by Gittins Gal View PostMaybe edge case was the wrong term to use, especially when there are testers listening in!
As an example, I injected some JavaScript from a server control - to do this you register the script using a unique key. In this instance I used a string literal as the key. His argument was that we should be dynamically building the key to ensure uniqueness. Well, yes it's best practice but in a piece of code that is completely self contained and will only ever inject this one script then why bother? Why introduce extra logic? It isn't going to break anything and we need to get this out the door pronto.
http://testobsessed.com/wp-content/u...eatsheetv1.pdfAnd what exactly is wrong with an "ad hominem" argument? Dodgy Agent, 16-5-2014Comment
-
Of course it is, but if you have a pedant on the team, why not use him to your advantage instead of dismissing his thoughts out of hand?Originally posted by suityou01 View PostSo is it possible to be just as over zealous in a testing world?And what exactly is wrong with an "ad hominem" argument? Dodgy Agent, 16-5-2014Comment
-
What does your architect say? Is it your call to make that this code is completely self contained?Originally posted by Gittins Gal View PostMaybe edge case was the wrong term to use, especially when there are testers listening in!
As an example, I injected some JavaScript from a server control - to do this you register the script using a unique key. In this instance I used a string literal as the key. His argument was that we should be dynamically building the key to ensure uniqueness. Well, yes it's best practice but in a piece of code that is completely self contained and will only ever inject this one script then why bother? Why introduce extra logic? It isn't going to break anything and we need to get this out the door pronto.
Another obsession of his is people on slow connections. He took time out to redesign buttons on another part of the site (for which he had no remit) to change the colour of their backgrounds while the page was loading so the user could read the button text.
Again, fair enough but the whole site is a warts and all application and his fine tuning everything is just holding us up.
Fortunately, the client is aware of this as I have his ear on this one.Knock first as I might be balancing my chakras.Comment
-
Again, my bad. Not injected as such but rendered server side so no security issues here.Originally posted by Mich the Tester View PostScript can often be injected from a GUI; that can form a security risk. It's one of the basic tests that security testers execute a I understand it; I'm not a security testing expert though. Sometimes I inject bits of html or even sql in a GUI and watch what happens. Some interesting stuff here;
http://testobsessed.com/wp-content/u...eatsheetv1.pdfComment
-
Hence my suggestion of a triage process for the edge cases.Originally posted by Mich the Tester View PostOf course it is, but if you have a pedant on the team, why not use him to your advantage instead of dismissing his thoughts out of hand?
1) Raise case
2) Analyse
3) Escalate or bin
Nothing fancy. A spreadsheet would do in the interim.Knock first as I might be balancing my chakras.Comment
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers
Contractor Services
CUK News
- Umbrella companies, beware JSL tunnel vision now that the Employment Rights Act is law Today 06:11
- 26 predictions for UK IT contracting in 2026 Yesterday 07:17
- How salary sacrifice pension changes will hit contractors Dec 24 07:48
- All the big IR35/employment status cases of 2025: ranked Dec 23 08:55
- Why IT contractors are (understandably) fed up with recruitment agencies Dec 22 13:57
- Contractors, don’t fall foul of HMRC’s expenses rules this Christmas party season Dec 19 09:55
- A delay to the employment status consultation isn’t why an IR35 fix looks further out of reach Dec 18 08:22
- How asking a tech jobs agency basic questions got one IT contractor withdrawn Dec 17 07:21
- Are Home Office immigration policies sacrificing IT contractors for ‘cheap labour’? Dec 16 07:48
- Will 2026 see the return of the ‘Outside IR35’ contractor? Dec 15 07:51

Comment