Quality Assurance

Here you’ll find a non-technical description of how the talented professionals at Orient Software will create a tailored software application to meet your business needs. Please read it over and then call us if you’d like additional information.

Key Actors for Quality Assurance

The project will have a scrum master, who is in charge of communication and the overall progress and quality of the project. He or she serves as the contact person for the client. The scrum master’s tasks include but are not limited to project coordination, tracking, and more. He or she speaks English fluently and in essence acts in the client’s best interest throughout the project, challenging the rest of the project team to find ever-better solutions.

The scrum master has sufficient technical expertise, making sure that the project is moving forward without sacrificing quality. Each project is also monitored by a central oversight committee through which members of top management regularly observe the team’s progress.

Open Communication

At Orient Software, we pride ourselves on having open communication with our clients. We use an online tool for recording the time spent on the project, and the client can review those logs whenever it is desired. Because we require that our team members fill out their timesheets promptly, you always have access to current data.

Telecommunications

At Orient Software, we rely on a variety of communication methods. We use digital phone lines to speak with our clients. We have multiple high-speed fiber and leased lines to providers of internet connectivity, ensuring that we’re never offline.

QA and the Software Development Process

Agile practices have had a heavy influence on the software development process at Orient Software. Above all, we always remain focused on each client’s specific requirements. Our iterative projects include each of the following components.

  • Vision – The client and our team work closely together to define the scope of the project, making sure that the IT work is closely aligned with the client’s business objectives. We explore our options for the software architecture and begin risk identification and mitigation.
  • Plan and Design – Our team engages in fine-tuning the project requirements and planning how the development will actually take place. The client reviews and approves the project plan.
  • Development – The actual development of the new software or web application.
  • Stability – We continuously ask the client for detailed feedback so that we can begin modifying the product to better meet your needs in future versions.

Orient Software has established standards for documentation, coding, and configurations, ensuring the consistently high quality of all that we do.

Product Specifications

Even if you don’t know exactly what you’re looking for, we’ll help you create detailed technical specifications. This might require identifying your businesses’ needs, the desired characteristics and benefits of the software, and the ways in which IT supports your business aims. We will consider the advantages and disadvantages offered by the technology you’re already using. We’ll consider various prototypes and plans and discuss how we can best collaborate with you before drafting the specifications and a price quote for you to review.

Our focus on quality assurance begins along with design and development, very early in the process. We create prototypes and design sketches early on so that you can confirm whether we’re on the right track.

Managing Project Scope

When dealing with off-site projects, scope must always be monitored, evaluated, and adapted as necessary. At Orient Software, we have a detailed procedure for managing project scope that relies on the scrum master understanding the client’s needs and our proposed solution inside and out. We thoroughly document each step of the development process should questions arise in the future. Many of our project management activities are automated and tracked electronically.

Developing and Integrating the Software

We work closely with our clients through the project. This lets us ensure your satisfaction with our work and adapt to any changes that you may request. We appreciate receiving regular feedback so that we can modify our work as needed and better mitigate risks. We make sure that the final software product can be integrated smoothly with your existing business systems and procedures.

Project Changes

Despite the best-laid plans, we know that our clients’ needs can and will change. Agile methods make change management easier. We work to accommodate your requests to change the software or system that is being developed.

Monitoring Progress

We have developed an in-house tool for monitoring our progress on each project. It gives us real-time updates and easy access to all our assigned tasks, resources, and progress. The client is also invited to access this tool online.

Risk Mitigation

We work on all our projects in a modern office building that is entirely secure. Security guards and finger print identification control who has access to the office around the clock.

Network Security

At Orient Software, all of our intellectual property, applications, networks, and systems are stored within a secure network architecture that has several characteristics of interest:

  • Points of Connection – The internet and Orient Software’s network are connected through external routers, which have packet filters for basic protection against traffic spoofing.
  • Firewall – The firewall prevents attacks (DDoS, DoS) and penetration (access without authorization) into our network, filtering out spyware, worms, viruses, and more. It also monitors and controls internal traffic.
  • Address Translation – Combined with our proxy, our translation function for the network address heightens security on our network for interactions between external resources and our LAN while still permitting FTP, web, mail, and related protocols.
  • Tunnels – These help us connect with other public computing networks. The Ispec-based tunnels provide encryption for traffic with 64 or more bits. We also have a secure VPS between our office and those of our clients. By using more than one ISP and by balancing the load, we make sure that our network is always available. Furthermore, by separating the guest network from the one that our staff members use, the network remains confidential and secure. We run antivirus programs every day and update our hotfix package each week for maximum security.
  • PartSecure – Our network contains PartSecure segments that serve as a protected firewall. We use this primarily for showing products to our clients.
  • AAA Domain – The AAA (authentication, authorization, accounting) domain is based on MS Active Directory for MS and non-MS platforms. It logs all significant user actions and authenticates all users who have access, including our employees, partners, and clients.