How does IT departments do application / update / patch testing?

Posted on 2014-08-20
Last Modified: 2014-08-21
I am moving into a new position within IT. My main job will be testing new applications as well updates and patches. My assumption when it comes to testing is that I should have all of the computer models that we deploy to staff as test units. In my case, we use Dell products and we have about 5 different models that are deployed to staff. Unfortunately, I cannot get access to all 5 of these models to test apps on. My question is, how do other IT departments do testing to make sure that app/update deployments work on all systems? What is the best way to do testing without asking staff to give up their computer for a few minutes? Are there ways to simulate specific laptop models using virtualization software?
Question by:prologic08
    LVL 116

    Accepted Solution

    We use a number of techniques, we use a virtual system, which has the same build version and image that we deploy to Servers and Desktops, and then we actually have different types of Desktop PCs, to also deploy applications and patches to as well.

    For laptops, because all our different, we have a standard build.

    Author Comment

    So you have created multiple virtual systems that duplicate the servers and desktops that you use. Am I able to duplicate a laptop down to the drivers that it uses? What if you want to test a driver update for certain hardware on the laptop?

    We also use a standard build for all laptops but we haven't gotten to the point that we have all of the drivers in one standard build. We are currently using multiple images that work only on the laptop model that it was created for. We are in the process of building a universal image but we are not there yet.
    LVL 116

    Expert Comment

    by:Andrew Hancock (VMware vExpert / EE MVE)
    You will only be able to test drivers for hardware on the physical hardware.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    VM backups can be lost due to a number of reasons: accidental backup deletion, backup file corruption, disk failure, lost or stolen hardware, malicious attack, or due to some other undesired and unpredicted event. Thus, having more than one copy of …
    Email signature management is something that is often overlooked in many organizations or is simply not implemented effectively. Let's take a look at what methods are available for managing this important piece of corporate branding.
    How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
    In this video tutorial I show you the main steps to install and configure  a VMware ESXi6.0 server. The video has my comments as text on the screen and you can pause anytime when needed. Hope this will be helpful. Verify that your hardware and BIO…

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now