摘要:
A method for evaluating a debugger script, the method includes: (i) receiving a debugger script that includes a first debugger breakpoint that is associated with a certain program line number; and determining a validity of the first debugger breakpoint in response to a comparison between expected content associated with the first debugger breakpoint and between an actual content of at least a portion of a certain program line group that comprises a certain program line identified by the certain program line number.
摘要:
A method of testing a system includes providing a shared memory including at least one value and at least one lock associated with the at least one value, the at least one lock including one or more shared read sublocks and an exclusive write sublock, providing a plurality of subsystems in communication with the shared memory and configured to access and update the at least one value, providing a test application on at least one of the plurality of subsystems, and running the test application on the one of the plurality of subsystems. A list of locks and values given to the test application includes a pre-existing list of locks and values in the system under the testing.
摘要:
Testing a computer program comprises identification of resource access requests by the computer program to a resource provided by an underlying host. The resource access requests may be intercepted and a determined response may be returned instead of the actual response of the underlying host. In some exemplary embodiments, the resource may a clock of the underlying host and the response may be the time of the clock. In some exemplary embodiments, the computer program may be tested to check for validity during execution on a cloud computing environment, in which access to resources may yield results that on a non-cloud computing environments are generally not expectable. The testing may be performed on a non-cloud computing environments and simulate scenarios applicable to cloud computing environments.
摘要:
Testing a computer program comprises identification of resource access requests by the computer program to a resource provided by an underlying host. The resource access requests may be intercepted and a determined response may be returned instead of the actual response of the underlying host. In some exemplary embodiments, the resource may a clock of the underlying host and the response may be the time of the clock. In some exemplary embodiments, the computer program may be tested to check for validity during execution on a cloud computing environment, in which access to resources may yield results that on a non-cloud computing environments are generally not expectable. The testing may be performed on a non-cloud computing environments and simulate scenarios applicable to cloud computing environments.
摘要:
Test plan to be utilized in a testing phase may be generated based on an initial test plan. A functional coverage model may be derived from the initial test plan. Modifications to the test plan may be automatically determined based on predetermined rules and parameters. Restrictions over possible combinations of values may be determined based on analysis of uncovered test activities in the initial test plan. Restrictions may be determined based on values of test activities in the initial test plan. Restrictions and modifications determined according to the disclosed subject matter may be indicated to a user for confirmation thereof.
摘要:
A method that may include: monitoring over time, actions carried out by at least one programmer over a software development environment to yield development patterns; comparing the development patterns to best practice rules to yield a comparison results indicating deviations of the development patterns from the best practice rules; and analyzing the comparison results based at least partially on a likelihood of each action deviated from the respective best practice rule to result in a software bug, to yield an analysis of potential software bug prone code sections, wherein at least one of the monitoring, the comparing, and the analyzing is executed by at least one processor.
摘要:
Test plan to be utilized in a testing phase may be generated based on an initial test plan. A functional coverage model may be derived from the initial test plan. Modifications to the test plan may be automatically determined based on predetermined rules and parameters. Restrictions over possible combinations of values may be determined based on analysis of uncovered test activities in the initial test plan. Restrictions may be determined based on values of test activities in the initial test plan. Restrictions and modifications determined according to the disclosed subject matter may be indicated to a user for confirmation thereof.
摘要:
A method that may include: monitoring over time, actions carried out by at least one programmer over a software development environment to yield development patterns; comparing the development patterns to best practice rules to yield a comparison results indicating deviations of the development patterns from the best practice rules; and analyzing the comparison results based at least partially on a likelihood of each action deviated from the respective best practice rule to result in a software bug, to yield an analysis of potential software bug prone code sections, wherein at least one of the monitoring, the comparing, and the analyzing is executed by at least one processor.
摘要:
A computer-implemented method for navigating a location marker in text, the method includes moving a location maker from one location in a text to another location in the text according to properties of the locations. The movements of the location maker further includes executing a command to move the location maker from one location in the text, the command is related to at least one property of said text. Then, responsive to the command, another location in said text with at least one property of text indicated by the command is searched, and the location marker is moved to the other location in the text found during the search.