Hybrid Cloud Testing For Mobile Development

Hybrid Cloud Testing For Mobile Development

Hybrid Cloud Testing for Mobile Development

Although the growing market for cloud-based mobile device testing is fostering increased use of outsourced, standalone testing services, some companies are realizing that fully cloud-based testing is not the answer. Some have concerns about security while others need their testers to have “hands-on” time with devices themselves.  In either case, they find that cloud-based automation tools are not sufficient.

At the same time, the lure of cloud-based testing for mobile applications and services is undeniable. This paradox is leading some firms to adopt a hybrid testing approach. In these scenarios, the company purchases or contracts for some combination of cloud-based testing tools but runs them inside the company’s own LAN in a virtual cloud environment.

This approach not only streamlines policy and security management; it also enables organizations to connect their on-premise devices to the same virtual cloud. This creates a single pool of devices (both physical and virtual through emulation) from which testers at any location can run remote cloud-based scenarios.

mobile-device-security

Best of all, the devices are still available locally to testers, who can remove them from their cloud connections as necessary and test actions or gestures on them as they would with a handheld device.

How Hybrid Cloud Testing Works

To achieve a hybrid cloud testing environment, a company would contract with a third-party cloud-testing-tool provider for time or packages, but would host the testing tool on its own internal server. Testers needing to perform automated testing could use the cloud-based devices directly. However, for those few cases when a tester needed to physically touch the phone―to test actions such as swiping a card or pinching/expanding a display, the tester could walk over to the rack and physically pick up the phone or tablet.

During the time that device was in use, it would be unavailable to testers in other locations for cloud-connected testing. As soon as the first tester returned the device to its connection dock, it would again appear in the pool of available devices that testers in all locations could use to run scripts.

Orasi encountered such a situation with a major financial institution that was testing an application’s functionality for bar-code scanning and check scanning. With a cloud and testing tools set up in the company’s own hosted environment, and on-premise phones connected to the cloud and the automation tools, anyone could test any functions or actions where automation worked―tests that did not require a physical action. When testers did need to test bar code and check scanning functionality, they had access to the physical devices themselves.

In our experience, testers were able to rely on automation 80% of the time. For manual testing (20% of cases), three-quarters of the time testers could achieve their goals by accessing the company’s connected devices remotely, through the cloud. However, for the remaining 25% (5% of total test cases), having the physical devices present ensured that testing could be completed quickly and accurately.

Defining the Structure

Of course, such a hybrid environment provides this extensive flexibility only for those testers working in the same location with the physical phones. Consequently, it makes sense to structure these hybrid clouds based upon tester needs.

For some companies, it might make sense to have all on-premise devices located in a central location where the majority of testers work. Testers in outlying areas could run automated and/or remote cases against those devices, but would need to contact testers at the device location and ask for assistance (or gain access to another physical device) to manually test specific hand gestures or other actions.

In other cases, where different groups of testers are working on projects with specific, unique manual testing requirements, it would make more sense to distribute devices based upon those requirements―equipping each location with the devices on which users would likely perform the gestures or activities most often.

Research firm IDC predicts that the use of third-party testing services and tools is going to grow considerably―nearly 15% per year, on a compound rate, until 2017. It ascribes much of this growth to the explosion of mobile and Web-based applications and services. Companies interested in using a hybrid cloud approach should evaluate their third-party partners with this functionality in mind, making sure that the tools or services they wish to use can be hosted on their own internal clouds.

By Joe Schulz

joe-schulzJoe is a seasoned developer with more than 25 years of professional application development and quality assurance experience.  Joe is the AVP, Mobile Testing at Orasi Software, one of the largest and most successful HP Software sales and services partners in the quality assurance space. With Orasi, he helps global organizations improve their development and QA processes around mobile device and application testing. For more information, visit www.orasi.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

The Internet of Things – Redefining The Digital World As We Know It

The Internet of Things – Redefining The Digital World As We Know It

Redefining The Digital World According to Internet World Stats (June 30th, 2015), no fewer than 3.2 billion people across the world now use the internet in one way or another. This means an incredible amount of data sharing through the utilization of API’s, Cloud platforms and inevitably the world of connected Things. The Internet of Things is a…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…