Browse Definitions :

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

This content is part of the Essential Guide: Taking charge of VM allocation, troubleshooting methods
Definition

troubleshooting

Contributor(s): Matthew Haughn

Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.

The first step in troubleshooting is gathering information on the issue, such as an undesired behavior or a lack of expected functionality. Other important information includes related symptoms and special circumstances that may be required to reproduce the issue.

Once the issue and how to reproduce it are understood, the next step might be to eliminate unnecessary components in the system and verify that the issue persists, to rule out incompatibility and third-party causes. 

Continuing, assuming the issue remains, one might next check common causes. Depending on the particular issue and the troubleshooter’s experience, they may have some ideas. They may also check product documentation and/or conduct research on a support database or through a search engine.

After common causes are ruled out, the troubleshooter may resort to the more systematic and logical process of verifying the expected function of parts of a system. One common method is the split-half troubleshooting approach: With a problem resulting from a number of possible parts in series, one tests half-way down the line of components. If the middle component works, one goes to the middle of the remaining parts, approaching the end. If the test finds a problem at the mid-point, one does a split towards the start of the line until the problem part is found. The split-half process can save time in systems that depend on many components.

Once the problem part is identified, it may be adjusted, repaired or replaced as needed. Evidence of effective troubleshooting is indicated when the issue is no longer reproducible and function is restored one.  

The success of troubleshooting often depends on the thoroughness and experience of the troubleshooter. That said, the majority of those who develop tech savvy are likely to have friends, coworkers and family who call on them for help.

People who don’t have the time or patience to solve their own issues might forgive the odd grumble or a tongue-in-cheek LMGTFY (Let Me Google That For You) link now and then.

See a screencast guide to fixing Windows 7 startup issues:

This was last updated in April 2014

Continue Reading About troubleshooting

Dig Deeper on Security management

Join the conversation

3 comments

Send me notifications when other members comment.

Please create a username to comment.

Informative blog. Thank you for sharing with us.
Cancel
learning blog thank u
Cancel
this was very helpful thanks for the contrubution 
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close