首页    期刊浏览 2024年09月20日 星期五
登录注册

文章基本信息

  • 标题:Bug Tracking System Analysis
  • 本地全文:下载
  • 作者:K.Lavanya ; P.Jennifer
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2015
  • 卷号:3
  • 期号:7
  • DOI:10.15680/ijircce.2015.0307221
  • 出版社:S&S Publications
  • 摘要:On time defect reporter and scheduler system project provides bug tracking, help desk, issue raising, search facility, helps info, and issue resolution. Issues related to software projects can be raised, tracked and resolved by employees of different departments. The different groups and representatives can interact each other through this system. The issue tracking system does all the jobs that are done in conventional system. In this proje ct it is done in more formal and efficient manner. All the users like programmer and tester and project manager of organization can interact with each other through the defect reporting tool. This system acts as an interface between the employees thereby e nabling them to forward their issues to the centralized report tracking system. Hence, making the work easy for both the issue raiser and the resol ver. It totally avoids the invol vement of middlemen in getting resolution for a particular issue.The defect t racking system is an internet as well as intranet application, which provides information about issues in software projects, in detail. This system can be used by all the departments of a software organization. In Issue Tracking, it fulfills different requ irements of administrator and employees of a software development organization efficiently. The specific purpose of the system is to gather and resolve issues that arise in different projects handled by the organization. Defect Tracking Systems are mainly required to incorporate with quite other information systems like contact information, customer databases, project planning systems, requirement management packages. This method is greatly handled to implement with security measures like granting admittanc e only to particular groups and permitting only authorized persons to modify the process.
国家哲学社会科学文献中心版权所有