摘要:
A method that may include: monitoring over time, actions carried out by at least one programmer over a software development environment to yield development patterns; comparing the development patterns to best practice rules to yield a comparison results indicating deviations of the development patterns from the best practice rules; and analyzing the comparison results based at least partially on a likelihood of each action deviated from the respective best practice rule to result in a software bug, to yield an analysis of potential software bug prone code sections, wherein at least one of the monitoring, the comparing, and the analyzing is executed by at least one processor.
摘要:
Test plan to be utilized in a testing phase may be generated based on an initial test plan. A functional coverage model may be derived from the initial test plan. Modifications to the test plan may be automatically determined based on predetermined rules and parameters. Restrictions over possible combinations of values may be determined based on analysis of uncovered test activities in the initial test plan. Restrictions may be determined based on values of test activities in the initial test plan. Restrictions and modifications determined according to the disclosed subject matter may be indicated to a user for confirmation thereof.
摘要:
A method that may include: monitoring over time, actions carried out by at least one programmer over a software development environment to yield development patterns; comparing the development patterns to best practice rules to yield a comparison results indicating deviations of the development patterns from the best practice rules; and analyzing the comparison results based at least partially on a likelihood of each action deviated from the respective best practice rule to result in a software bug, to yield an analysis of potential software bug prone code sections, wherein at least one of the monitoring, the comparing, and the analyzing is executed by at least one processor.
摘要:
A computer-implemented method for navigating a location marker in text, the method includes moving a location maker from one location in a text to another location in the text according to properties of the locations. The movements of the location maker further includes executing a command to move the location maker from one location in the text, the command is related to at least one property of said text. Then, responsive to the command, another location in said text with at least one property of text indicated by the command is searched, and the location marker is moved to the other location in the text found during the search.
摘要:
A method for managing a group of targets is provided. The method includes: receiving a request to update a x'th generation copy of a data entity, where x is a positive integer. Then applying an update function responsive to x such as to update a first sub-group of targets. Then receiving a request to read a y'th generation copy of the data entity and (iv) applying a retrieve function responsive to y such as to search for the y'th generation copy of the data entity in a second sub-group of targets. The first and second sub-groups intersect only once and only if y does not exceed x.
摘要:
A method for modeling a test space is provided. The method comprises defining a coverage model including one or more variables, wherein respective values for the variables are assigned, one or more definitions of value properties for said variables with assigned values, and one or more restrictions that limit combination of variable values that are legal for the model, wherein at least one of said restrictions is defined using at least one value property.
摘要:
A method for modeling a test space is provided. The method comprises defining a coverage model including one or more variables, wherein respective values for the variables are assigned, one or more definitions of value properties for said variables with assigned values, and one or more restrictions that limit combination of variable values that are legal for the model, wherein at least one of said restrictions is defined using at least one value property.
摘要:
A method for initializing a memory area, the method includes: receiving a request to access a first memory sub area of a first memory area that comprises multiple memory sub areas; and initializing the first memory sub area if a first memory area initialization indicator differs from a first memory sub area initialization request indicator; wherein the first memory area initialization request indicator is a multiple bit variable indicative of a time of a last request to initialize the first memory area and the first memory sub area initialization indicator is a multiple bit variable indicative of a time of a request to initialize the first memory area that resulted in a last initialization of the first memory sub area.
摘要:
A method for synchronizing data storage systems is provided. The method comprises designating a relationship between a first data storage system and a second data storage system, such that data stored in the first data storage system is copied to the second data storage system, in response to determining that the data stored in the first data storage system has been modified; receiving a first request to modify data stored in a first data block of a first storage volume in the first data storage system, wherein the data block is modified according to the first request; determining that the first data block has not been successfully synchronized when the modified data stored in the first data block is not copied to the second data storage system; and executing a process to retry synchronization of the first data block until synchronization of the first data block is successful, without suspending the relationship while the process is executed.
摘要:
Provided are a method, system, and article of manufacture wherein a command is received for writing data to a first storage location. A determination is made that previously written data is stored in the first storage location. The previously written data is copied to a second storage location, in response to determining that the previously written data is stored in the first storage location. The data is written to the first storage location, in response to copying the previously written data to the second storage location.