In computing, a service pack comprises a collection of updates, fixes, or enhancements to a software program delivered in the form of a single installable package. Companies often release a service pack when the number of individual patches to a given program reaches a certain (arbitrary) limit, or the software release has shown to be stabilized with a limited number of remaining issues based on users' feedback and bug reports . In large software applications such as office suites, operating systems, database software, or network management, it is not uncommon to have a service pack issued within the first year or two of a product's release. Installing a service pack is easier and less error-prone than installing many individual patches, even more so when updating multiple computers over a network, where service packs are common.
51-413: Service packs are usually numbered, and thus shortly referred to as SP1, SP2, SP3 etc. They may also bring, besides bug fixes, entirely new features, as is the case of SP2 of Windows XP (e.g. Windows Security Center ), or SP3 and SP4 of the heavily database dependent Trainz 2009: World Builder Edition . Service Packs for Microsoft Windows were cumulative through Windows XP . This means that
102-424: A program specification which states the behavior of a program, can prevent bugs. Some contend that formal specifications are impractical for anything but the shortest programs, because of problems of combinatorial explosion and indeterminacy . One goal of software testing is to find bugs. Measurements during testing can provide an estimate of the number of likely bugs remaining. This becomes more reliable
153-444: A bug may be caused by a relatively minor, typographical error (typo) in the code. For example, this code executes function foo only if condition is true. But this code always executes foo : A convention that tends to prevent this particular issue is to require braces for a block even if it has just one line. Enforcement of conventions may be manual (i.e. via code review ) or via automated tools. Some contend that writing
204-744: A custom set of steps tailored to the needs of a specific project or group. In some cases, a "sponsor" or "maintenance" organization distributes an official set of documents that describe the process. Specific examples include: Since DSDM in 1994, all of the methodologies on the above list except RUP have been agile methodologies - yet many organizations, especially governments, still use pre-agile processes (often waterfall or similar). Software process and software quality are closely interrelated; some unexpected facets and effects have been observed in practice. Among these, another software development process has been established in open source . The adoption of these best practices known and established processes within
255-416: A day. Extreme programming (XP) adopted the concept of CI and did advocate integrating more than once per day – perhaps as many as tens of times per day. Various methods are acceptable for combining linear and iterative systems development methodologies, with the primary objective of each being to reduce inherent project risk by breaking a project into smaller segments and providing more ease-of-change during
306-453: A failure would not occur until later at runtime. Some languages exclude features that easily lead to bugs, at the expense of slower performance – the principle being that it is usually better to write simpler, slower correct code than complicated, buggy code. For example, the Java does not support pointer arithmetic which is generally fast, but is considered dangerous; relatively easy to cause
357-534: A group of software development frameworks based on iterative development, where requirements and solutions evolve via collaboration between self-organizing cross-functional teams. The term was coined in the year 2001 when the Agile Manifesto was formulated. Agile software development uses iterative development as a basis but advocates a lighter and more people-centric viewpoint than traditional approaches. Agile processes fundamentally incorporate iteration and
408-431: A key area many felt had been neglected by other methodologies: deliberate iterative risk analysis, particularly suited to large-scale complex systems. The basic principles are: Shape Up is a software development approach introduced by Basecamp in 2018. It is a set of principles and techniques that Basecamp developed internally to overcome the problem of projects dragging on with no clear end. Its primary target audience
459-517: A later time, additional components are added to the software using the original media, there is a risk of accidentally mixing older and updated components. Depending on the operating system and deployment methods, it may then be necessary to manually reinstall the service pack after each such change to the software. This was, for example, necessary for Windows NT service packs; however, from Windows 2000 onwards, Microsoft redirected setup programs to use updated service pack files instead of files from
510-557: A major bug. Some languages include features that add runtime overhead in order to prevent some bugs. For example, many languages include runtime bounds checking and a way to handle out-of-bounds conditions instead of crashing. A compiled language allows for detecting some typos (such as a misspelled identifier) before runtime which is earlier in the software development process than for an interpreted language. Programming techniques such as programming style and defensive programming are intended to prevent typos. For example,
561-432: A measure of impact the bug has. This impact may be data loss, financial, loss of goodwill and wasted effort. Severity levels are not standardized, but differ by context such as industry and tracking tool. For example, a crash in a video game has a different impact than a crash in a bank server. Severity levels might be crash or hang , no workaround (user cannot accomplish a task), has workaround (user can still accomplish
SECTION 10
#1732775428641612-452: A traditional engineering approach applied to software engineering. A strict waterfall approach discourages revisiting and revising any prior phase once it is complete. This "inflexibility" in a pure waterfall model has been a source of criticism by supporters of other more "flexible" models. It has been widely blamed for several large-scale government projects running over budget, over time and sometimes failing to deliver on requirements due to
663-680: Is a process of planning and managing software development . It typically involves dividing software development work into smaller, parallel, or sequential steps or sub-processes to improve design and/or product management . The methodology may include the pre-definition of specific deliverables and artifacts that are created and completed by a project team to develop or maintain an application. Most modern development processes can be vaguely described as agile . Other methodologies include waterfall , prototyping , iterative and incremental development , spiral development , rapid application development , and extreme programming . A life-cycle "model"
714-560: Is deployed, ongoing maintenance and support become crucial to address any issues, enhance performance, and incorporate future enhancements. Regular updates, bug fixes, and security patches are released to keep the software up-to-date and secure. This phase also involves providing technical support to end users and addressing their queries or concerns. Methodologies, processes, and frameworks range from specific prescriptive steps that can be used directly by an organization in day-to-day work, to flexible frameworks that an organization uses to generate
765-488: Is easy to hide vulnerabilities in complex, little understood and undocumented source code," because, "even if people are reviewing the code, that doesn't mean they're qualified to do so." An example of an open-source software bug was the 2008 OpenSSL vulnerability in Debian . Debugging can be a significant part of the software development lifecycle . Maurice Wilkes , an early computing pioneer, described his realization in
816-464: Is remote teams. Shape Up has no estimation and velocity tracking, backlogs, or sprints, unlike waterfall , agile , or scrum . Instead, those concepts are replaced with appetite, betting, and cycles. As of 2022, besides Basecamp, notable organizations that have adopted Shape Up include UserVoice and Block. Other high-level software project methodologies include: Some " process models " are abstract descriptions for evaluating, comparing, and improving
867-400: Is seen as flowing steadily downwards (like a waterfall) through several phases, typically: The first formal description of the method is often cited as an article published by Winston W. Royce in 1970, although Royce did not use the term "waterfall" in this article. Royce presented this model as an example of a flawed, non-working model. The basic principles are: The waterfall model is
918-418: Is sometimes considered a more general term for a category of methodologies and a software development "process" is a particular instance as adopted by a specific organization. For example, many specific software development processes fit the spiral life-cycle model. The field is often considered a subset of the systems development life cycle . The software development methodology framework did not emerge until
969-435: Is typically to console , window , log file or a hardware output (i.e. LED ). Some contend that locating a bug is something of an art. It is not uncommon for a bug in one section of a program to cause failures in a different section, thus making it difficult to track, in an apparently unrelated part of the system. For example, an error in a graphics rendering routine causing a file I/O routine to fail. Sometimes,
1020-468: The Therac-25 radiation machine deaths was a bug (specifically, a race condition ) that occurred only when the machine operator very rapidly entered a treatment plan; it took days of practice to become able to do this, so the bug did not manifest in testing or when the manufacturer attempted to duplicate it. Other bugs may stop occurring whenever the setup is augmented to help find the bug, such as running
1071-532: The big design up front approach. Except when contractually required, the waterfall model has been largely superseded by more flexible and versatile methodologies developed specifically for software development. See Criticism of waterfall model . In 1988, Barry Boehm published a formal software system development "spiral model," which combines some key aspects of the waterfall model and rapid prototyping methodologies, in an effort to combine advantages of top-down and bottom-up concepts. It provided emphasis on
SECTION 20
#17327754286411122-407: The 1960s. According to Elliott (2004), the systems development life cycle can be considered to be the oldest formalized methodology framework for building information systems . The main idea of the software development life cycle has been "to pursue the development of information systems in a very deliberate, structured and methodical way, requiring each stage of the life cycle––from the inception of
1173-608: The US Department of Commerce 's National Institute of Standards and Technology concluded that "software bugs, or errors, are so prevalent and so detrimental that they cost the US economy an estimated $ 59 billion annually, or about 0.6 percent of the gross domestic product". Since the 1950s, some computer systems have been designed to detect or auto-correct various software errors during operations. Mistake metamorphism (from Greek meta = "change", morph = "form") refers to
1224-688: The behavior a bug. However, Justin Brookman of the Center for Democracy and Technology directly challenged that portrayal, stating "I'm glad that they are fixing what they call bugs, but I take exception with their strong denial that they track users." Preventing bugs as early as possible in the software development process is a target of investment and innovation. Newer programming languages tend to be designed to prevent common bugs based on vulnerabilities of existing languages. Lessons learned from older languages such as BASIC and C are used to inform
1275-400: The bug's severity and priority and external factors such as development schedules. Triage generally does not include investigation into cause. Triage may occur regularly. Triage generally consists of reviewing new bugs since the previous triage and maybe all open bugs. Attendees may include project manager, development manager, test manager, build manager, and technical experts. Severity is
1326-411: The code and imagining or transcribing the execution process may often find errors without ever reproducing the bug as such. Typically, the first step in locating a bug is to reproduce it reliably. If unable to reproduce the issue, a programmer cannot find the cause of the bug and therefore cannot fix it. Some bugs are revealed by inputs that may be difficult for the programmer to re-create. One cause of
1377-654: The code explicitly (perhaps as simple as a statement saying PRINT "I AM HERE" ), or provided as tools. It is often a surprise to find where most of the time is taken by a piece of code, and this removal of assumptions might cause the code to be rewritten. Open source development allows anyone to examine source code. A school of thought popularized by Eric S. Raymond as Linus's law says that popular open-source software has more chance of having few or no bugs than other software, because "given enough eyeballs, all bugs are shallow". This assertion has been disputed, however: computer security specialist Elias Levy wrote that "it
1428-482: The code may eliminate the problem even though the code then no longer matches the documentation. In an embedded system , the software is often modified to work around a hardware bug since it's cheaper than modifying the hardware. Bugs are managed via activities like documenting, categorizing, assigning, reproducing, correcting and releasing the corrected code. Tools are often used to track bugs and other issues with software. Typically, different tools are used by
1479-401: The confines of a company is called inner source . Software prototyping is about creating prototypes, i.e. incomplete versions of the software program being developed. The basic principles are: A basic understanding of the fundamental business problem is necessary to avoid solving the wrong problems, but this is true for all software methodologies. "Agile software development" refers to
1530-420: The continuous feedback that it provides to successively refine and deliver a software system. The Agile model also includes the following software development processes: Continuous integration is the practice of merging all developer working copies to a shared mainline several times a day. Grady Booch first named and proposed CI in his 1991 method , although he did not advocate integrating several times
1581-485: The custom software development process involves understanding the client's requirements and objectives. This stage typically involves engaging in thorough discussions and conducting interviews with stakeholders to identify the desired features, functionalities, and overall scope of the software. The development team works closely with the client to analyze existing systems and workflows, determine technical feasibility, and define project milestones. Planning and design: Once
Service pack - Misplaced Pages Continue
1632-472: The design of later languages such as C# and Rust . Languages may include features such as a static type system , restricted namespaces and modular programming . For example, for a typed, compiled language (like C ): is syntactically correct, but fails type checking since the right side, a string, cannot be assigned to a float variable. Compilation fails – forcing this defect to be fixed before development progress can resume. With an interpreted language,
1683-408: The development of preliminary data models and business process models using structured techniques . In the next stage, requirements are verified using prototyping, eventually to refine the data and process models. These stages are repeated iteratively; further development results in "a combined business requirements and technical design statement to be used for constructing new systems". The term
1734-562: The development process. There are three main variants of incremental development: Rapid application development (RAD) is a software development methodology, which favors iterative development and the rapid construction of prototypes instead of large amounts of up-front planning. The "planning" of software developed using RAD is interleaved with writing the software itself. The lack of extensive pre-planning generally allows software to be written much faster and makes it easier to change requirements. The rapid development process starts with
1785-541: The evolution of a defect in the final stage of software deployment. Transformation of a "mistake" committed by an analyst in the early stages of the software development lifecycle, which leads to a "defect" in the final stage of the cycle has been called 'mistake metamorphism'. Different stages of a mistake in the development cycle may be described as mistake, anomaly, fault, failure, error, exception, crash, glitch, bug, defect, incident, or side effect. Software bugs have been linked to disasters. Sometimes
1836-469: The idea to delivery of the final system––to be carried out rigidly and sequentially" within the context of the framework being applied. The main target of this methodology framework in the 1960s was "to develop large scale functional business systems in an age of large scale business conglomerates. Information systems activities revolved around heavy data processing and number crunching routines." Requirements gathering and analysis: The first phase of
1887-462: The late 1940s that “a good part of the remainder of my life was going to be spent in finding errors in my own programs”. A program known as a debugger can help a programmer find faulty code by examining the inner workings of a program such as executing code line-by-line and viewing variable values. As an alternative to using a debugger, code may be instrumented with logic to output debug information to trace program execution and view values. Output
1938-441: The longer a product is tested and developed. Agile software development may involve frequent software releases with relatively small changes. Defects are revealed by user feedback. With test-driven development (TDD), unit tests are written while writing the production code, and the production code is not considered complete until all tests complete successfully. Tools for static code analysis help developers by inspecting
1989-424: The most difficult part of debugging is finding the cause of the bug. Once found, correcting the problem is sometimes easy if not trivial. Sometimes, a bug is not an isolated flaw, but represents an error of thinking or planning on the part of the programmers. Often, such a logic error requires a section of the program to be overhauled or rewritten. Some contend that as a part of code review , stepping through
2040-419: The original installation media in order to prevent manual reinstall. Software bug A software bug is a design defect ( bug ) in computer software . A computer program with many or serious bugs may be described as buggy . The effects of a software bug range from minor (such as a misspelled word in the user interface ) to severe (such as frequent crashing ). In 2002, a study commissioned by
2091-461: The planning and design in place, the development team begins the coding process. This phase involves writing , testing, and debugging the software code. Agile methodologies, such as scrum or kanban, are often employed to promote flexibility, collaboration, and iterative development. Regular communication between the development team and the client ensures transparency and enables quick feedback and adjustments. Testing and quality assurance: To ensure
Service pack - Misplaced Pages Continue
2142-613: The problems that are fixed in a service pack are also fixed in later service packs. For example, Windows XP SP3 contains all the fixes that are included in Windows XP Service Pack 2 (SP2). Windows Vista SP2 was not cumulative, however, but incremental, requiring that SP1 be installed first. Office XP , Office 2003 , Office 2007 , Office 2010 and Office 2013 service packs have been cumulative. Application service packs replace existing files with updated versions that typically fix bugs or close security holes . If, at
2193-526: The program text beyond the compiler's capabilities to spot potential problems. Although in general the problem of finding all programming errors given a specification is not solvable (see halting problem ), these tools exploit the fact that human programmers tend to make certain kinds of simple mistakes often when writing software. Tools to monitor the performance of the software as it is running, either specifically to find problems such as bottlenecks or to give assurance as to correct working, may be embedded in
2244-537: The program with a debugger; these are called heisenbugs (humorously named after the Heisenberg uncertainty principle ). Since the 1990s, particularly following the Ariane 5 Flight 501 disaster, interest in automated aids to debugging rose, such as static code analysis by abstract interpretation . Often, bugs come about during coding, but faulty design documentation may cause a bug. In some cases, changes to
2295-467: The requirements are understood, the custom software development team proceeds to create a comprehensive project plan. This plan outlines the development roadmap, including timelines, resource allocation, and deliverables. The software architecture and design are also established during this phase. User interface (UI) and user experience (UX) design elements are considered to ensure the software's usability, intuitiveness, and visual appeal. Development: With
2346-468: The software development team to track their workload than by customer service to track user feedback . A tracked item is often called bug , defect , ticket , issue , feature , or for agile software development , story or epic . Items are often categorized by aspects such as severity, priority and version number . In a process sometimes called triage , choices are made for each bug about whether and when to fix it based on information such as
2397-405: The software passes the testing phase, it is ready for deployment and implementation. The development team assists the client in setting up the software environment, migrating data if necessary, and configuring the system. User training and documentation are also provided to ensure a smooth transition and enable users to maximize the software's potential. Maintenance and support: After the software
2448-462: The software's reliability, performance, and security, rigorous testing and quality assurance (QA) processes are carried out. Different testing techniques, including unit testing, integration testing, system testing, and user acceptance testing, are employed to identify and rectify any issues or bugs. QA activities aim to validate the software against the predefined requirements, ensuring that it functions as intended. Deployment and implementation: Once
2499-449: The task), visual defect (a misspelling for example), or documentation error . Another example set of severities: critical , high , low , blocker , trivial . The severity of a bug may be a separate category to its priority for fixing, or the two may be quantified and managed separately. Software development process In software engineering , a software development process or software development life cycle ( SDLC )
2550-548: The use of bug to describe the behavior of software is contentious due to perception. Some suggest that the term should be abandoned; replaced with defect or error . Some contend that bug implies that the defect arose on its own and push to use defect instead since it more clearly connotates caused by a human. Some contend that bug may be used to coverup an intentional design decision. In 2011, after receiving scrutiny from US Senator Al Franken for recording and storing users' locations in unencrypted files, Apple called
2601-452: Was first used to describe a software development process introduced by James Martin in 1991. According to Whitten (2003), it is a merger of various structured techniques , especially data-driven information technology engineering , with prototyping techniques to accelerate software systems development. The basic principles of rapid application development are: The waterfall model is a sequential development approach, in which development
SECTION 50
#1732775428641#640359