Defect Prioritization With the Risk Priority Number

Published: May 28, 2015, 5 p.m.

b'Most software systems have some "defects" that are identified by users.\\xa0 Some of these are truly defects in that the requirements were not properly implemented; some are caused by changes made to other systems; still others are requests for enhancement \\u2013 improvements that would improve the users\' experience.\\xa0 These "defects" are generally stored in a database and are worked off in a series of incrementally delivered updates. For most systems, it is not financially feasible to fix all of the concerns in the near term, and indeed some issues may never be addressed. The government program office has an obligation to choose wisely among a set of competing defects to be implemented, especially in a financially constrained environment. In this podcast, Will Hayes and Julie Cohen discuss a generalized technique that could be used with any type of system to assist the program office in addressing and resolving the conflicting views and creating a better value system for defining releases.\\xa0 Listen on Apple Podcasts.'