Hybrid Cloud Testing For Mobile Development

Hybrid Cloud Testing For Mobile Development

Hybrid Cloud Testing for Mobile Development

Although the growing market for cloud-based mobile device testing is fostering increased use of outsourced, standalone testing services, some companies are realizing that fully cloud-based testing is not the answer. Some have concerns about security while others need their testers to have “hands-on” time with devices themselves.  In either case, they find that cloud-based automation tools are not sufficient.

At the same time, the lure of cloud-based testing for mobile applications and services is undeniable. This paradox is leading some firms to adopt a hybrid testing approach. In these scenarios, the company purchases or contracts for some combination of cloud-based testing tools but runs them inside the company’s own LAN in a virtual cloud environment.

This approach not only streamlines policy and security management; it also enables organizations to connect their on-premise devices to the same virtual cloud. This creates a single pool of devices (both physical and virtual through emulation) from which testers at any location can run remote cloud-based scenarios.

mobile-device-security

Best of all, the devices are still available locally to testers, who can remove them from their cloud connections as necessary and test actions or gestures on them as they would with a handheld device.

How Hybrid Cloud Testing Works

To achieve a hybrid cloud testing environment, a company would contract with a third-party cloud-testing-tool provider for time or packages, but would host the testing tool on its own internal server. Testers needing to perform automated testing could use the cloud-based devices directly. However, for those few cases when a tester needed to physically touch the phone―to test actions such as swiping a card or pinching/expanding a display, the tester could walk over to the rack and physically pick up the phone or tablet.

During the time that device was in use, it would be unavailable to testers in other locations for cloud-connected testing. As soon as the first tester returned the device to its connection dock, it would again appear in the pool of available devices that testers in all locations could use to run scripts.

Orasi encountered such a situation with a major financial institution that was testing an application’s functionality for bar-code scanning and check scanning. With a cloud and testing tools set up in the company’s own hosted environment, and on-premise phones connected to the cloud and the automation tools, anyone could test any functions or actions where automation worked―tests that did not require a physical action. When testers did need to test bar code and check scanning functionality, they had access to the physical devices themselves.

In our experience, testers were able to rely on automation 80% of the time. For manual testing (20% of cases), three-quarters of the time testers could achieve their goals by accessing the company’s connected devices remotely, through the cloud. However, for the remaining 25% (5% of total test cases), having the physical devices present ensured that testing could be completed quickly and accurately.

Defining the Structure

Of course, such a hybrid environment provides this extensive flexibility only for those testers working in the same location with the physical phones. Consequently, it makes sense to structure these hybrid clouds based upon tester needs.

For some companies, it might make sense to have all on-premise devices located in a central location where the majority of testers work. Testers in outlying areas could run automated and/or remote cases against those devices, but would need to contact testers at the device location and ask for assistance (or gain access to another physical device) to manually test specific hand gestures or other actions.

In other cases, where different groups of testers are working on projects with specific, unique manual testing requirements, it would make more sense to distribute devices based upon those requirements―equipping each location with the devices on which users would likely perform the gestures or activities most often.

Research firm IDC predicts that the use of third-party testing services and tools is going to grow considerably―nearly 15% per year, on a compound rate, until 2017. It ascribes much of this growth to the explosion of mobile and Web-based applications and services. Companies interested in using a hybrid cloud approach should evaluate their third-party partners with this functionality in mind, making sure that the tools or services they wish to use can be hosted on their own internal clouds.

By Joe Schulz

joe-schulzJoe is a seasoned developer with more than 25 years of professional application development and quality assurance experience.  Joe is the AVP, Mobile Testing at Orasi Software, one of the largest and most successful HP Software sales and services partners in the quality assurance space. With Orasi, he helps global organizations improve their development and QA processes around mobile device and application testing. For more information, visit www.orasi.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…