Patent application number | Description | Published |
20080256313 | System, Method And Computer Program Product For Remote Mirroring - A method for remote mirroring, the method includes: (a) establishing a remote mirroring relationship between a primary site and a secondary site; (b) copying data from the primary site to the secondary site; and (c) writing status information by a primary site controller to a first memory space at the secondary site, the first memory space is allocated for storing status information representative of a relationship between (i) data stored in the primary site but destined to be copied to the secondary site and (ii) data copied from the primary site to the secondary site. | 10-16-2008 |
20080276226 | DEVICE, METHOD AND COMPUTER PROGRAM PRODUCT FOR EVALUATING A DEBUGGER SCRIPT - A method for evaluating a debugger script, the method includes: (i) receiving a debugger script that includes a first debugger breakpoint that is associated with a certain program line number; and determining a validity of the first debugger breakpoint in response to a comparision between expected content associated with the first debugger breakpoint and between an actual content of at least a portion of a certain program line group that comprises a certain program line identified by the certain program line number. | 11-06-2008 |
20090113435 | INTEGRATED BACKUP WITH CALENDAR - A computer implemented method, apparatus, and computer program product for automatically scheduling execution of a process using information in a calendar. Entries in a set of electronic calendars associated with a set of users are analyzed to generate expected computer usage patterns for the set of users. A low usage time interval for a computer is identified using the expected computer usage patterns. The low usage time interval for the computer is a time interval when expected usage of the computer by the set of users does not exceed a threshold amount of usage. The process is automatically executed during the low usage time interval. | 04-30-2009 |
20090281782 | DEVICE, SYSTEM, AND METHOD OF STORAGE CONTROLLER HAVING SIMULATED VOLUMES - Device, system, and method of storage controller having simulated volumes. For example, an apparatus for data storage management includes: a storage controller to manage access to one or more physical volumes, the storage controller including a simulation module to simulate access to one or more simulated volumes. | 11-12-2009 |
20090281783 | DEVICE, SYSTEM, AND METHOD OF STORAGE CONTROLLER SIMULATING DATA MIRRORING - Device, system, and method of storage controller simulating data mirroring. For example, an apparatus for simulating data mirroring includes: a storage controller to control a primary storage unit that has data stored therein, wherein the storage controller is able to simulate a process of mirroring data stored in the primary storage unit in response to a mirroring simulation command. | 11-12-2009 |
20090319833 | Software Quality Assessment based on Semantic Similarities - A method for software processing includes accepting quality information, which includes names of elements of software code and respective quality indications regarding tested acceptability of the elements. The names are processed to extract a list of substrings that occur in the names. Respective metrics are assigned to the substrings responsively to the quality indications of the elements in whose names the substrings occur. At least some of the substrings are presented to a user in accordance with the assigned metrics. | 12-24-2009 |
20100023561 | Data Restoration in a Storage System using Multiple Restore Points - A data restoration method comprising determining whether a restoration process is in progress, in response to receiving a read request to read contents from a track on a source volume (ST[i]); reading data from ST[i], in response to determining that the restoration process is not in progress; determining whether the read request was originated from a host, in response to determining the restoration process is in progress; reading the data directly from ST[i], in response to determining the read request was not originated from a host; determining whether ST[i] is designated as remote with respect to the restore operation, in response to determining the read request was originated from a host; reading the data directly from ST[i], in response to determining ST[i] is designated as local; and reading the data from a track on a target volume (TT[i]), in response to determining ST[i] is designated as remote. | 01-28-2010 |
20100031237 | Methods for Detecting Inter-Module Dependencies - Methods for detecting inter-module dependencies involve receiving by a software configuration control system check-in for each of a plurality of software components accompanied by check-in information consisting at least in part of defect information, which is utilized to identify coupling between any of the checked-in software components that were checked in together on a same defect and any of the checked-in software components that were checked in on a defect that was introduced by a defect in another software component. Warnings and reports are generated of a likely incidence of coupling between any of the software components identified as having been checked in together on a same defect, as well as between any of the software components identified as having been checked in on a defect that was introduced by a defect in another software component and such other software component. | 02-04-2010 |
20100050161 | Detecting Locking Discipline Violations on Shared Resources - Detecting locking discipline violations on shared resources. For example, a method of detecting locking discipline violations of shared resources of a computing platform, by a testing process to be executed concurrently with one or more other processes on said computing platform, the testing process comprising: locking a shared resource of said computing platform; reading a value of the shared resource; locally storing the value of the shared resource; rereading the value of the shared resource after a predefined time period; and generating a locking discipline violation report if the value of said shared resource as reread by said rereading is different from the value of said resource as locally stored by said locally storing. | 02-25-2010 |
20100063918 | METHOD TO PRIORITIZE PRODUCT REQUIREMENTS - A method for prioritizing features that can be incorporated into a product, the method including: issuing a weighting factor to each stakeholder having an economic interest in the product, a size of the weighting factor being proportional to a size of a budget for each stakeholder; bidding an amount of the weighting factor for each feature by each stakeholder, a total amount bid by each stakeholder is not to exceed the size of the weighting factor issued to each stakeholder; summing the amounts bid for each feature to provide a total feature bid for each feature; and prioritizing the features in order from highest total feature bid to lowest total feature bid. | 03-11-2010 |
20100064280 | SYSTEMS AND METHODS FOR IMPLEMENTING TEST APPLICATIONS FOR SYSTEMS USING LOCKS - A method of testing a system includes providing a shared memory including at least one value and at least one lock associated with the at least one value, the at least one lock including one or more shared read sublocks and an exclusive write sublock, providing a plurality of subsystems in communication with the shared memory and configured to access and update the at least one value, providing a test application on at least one of the plurality of subsystems, and running the test application on the one of the plurality of subsystems. A list of locks and values given to the test application includes a pre-existing list of locks and values in the system under the testing. | 03-11-2010 |
20100131930 | Selective Code Coverage Instrumentation - Reporting on software test coverage, where a set of coverage tasks and a coverage task hierarchy have been established for a software under test (SUT). Establishing a coverage task subset, the subset including at least one coverage task hierarchy element at a level above the lowest coverage task hierarchy level. Identifying when, during a software test, a coverage task in the coverage task subset was completed. Outputting to a user the identity of those portions of the coverage task that have been completed. Refining the coverage task subset in one of the following fashions through the coverage task hierarchy in accordance with user input: depth first progression, breadth first progression. | 05-27-2010 |
20100146348 | EFFICIENT METHOD AND APPARATUS FOR KEEPING TRACK OF IN FLIGHT DATA IN A DUAL NODE STORAGE CONTROLLER - A storage unit adapted for use in a processing system includes a controller including at least two compute nodes, each of the compute nodes including a read/write cache and a persistent cache; and machine executable instructions stored within machine readable media, the instructions including instructions for tracking in-flight data in the persistent cache and composing a list of the in-flight data segments after a failure of the controller. A processing system and a method are also provided. | 06-10-2010 |
20100169716 | MANAGING CONFIDENCE LEVELS IN A COMPUTING SYSTEM - A method for managing confidence levels in a computing system is provided. The method comprises determining a first confidence level associated with a first operation performed in the computing system. The first confidence level indicates probability that the first operation was performed successfully and is calculated based on attributes of one or more components in the computing system. Once the first confidence level is determined, the first confidence level is compared to a confidence threshold for the first operation. If the first confidence level is less than the confidence threshold, a first remedial action is taken to raise the first confidence level. | 07-01-2010 |
20100174864 | PERFORMANCE IN A DATA STORAGE SYSTEM - A method for improving performance in a storage system is provided. The method comprises receiving a request to destage a partial stride of data from a storage cache; reserving space for a full stride of data on one or more storage devices; allocating the partial stride of data to the reserved space; adding padding for unallocated blocks, wherein the unallocated blocks are reserved for future updates; and destaging the full stride of data to the storage devices, wherein the full stride of data comprises the allocated partial stride of data and the padded unallocated blocks. | 07-08-2010 |
20100262866 | CROSS-CONCERN CODE COVERAGE ASSESSMENT - A method for software processing includes extracting from software code under test respective items of meta-information pertaining to elements of the software code and receiving respective quality data regarding the elements of software code. The quality data and meta-information are processed in a computer so as to assign respective metrics to the items of the meta-information responsively to the quality data regarding the elements of the software code to which the items pertain. At least some of the meta-information is presented to a user in accordance with the assigned metrics. | 10-14-2010 |
20110093745 | SYSTEMS AND METHODS FOR IMPLEMENTING TEST APPLICATIONS FOR SYSTEMS USING LOCKS - The present invention generally relates to systems and methods for implementing test applications of systems using locks. | 04-21-2011 |
20110099135 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR EVALUATING A STORAGE POLICY BASED ON SIMULATION - A computer implemented method for generating a storage policy for a storage system based on simulation results associated with a state of the storage system is provided. The method comprises receiving a target function applicable to a storage system, wherein the target function represents a measure of values associated with storage parameters related to productivity and loss tolerance of the storage system; wherein the simulation results for a state of the storage system are calculated based on a least one of (a) the storage system simulated response to a set of simulated file-related storage operation requests generated based on one or more simulation rules, (b) the state of the storage system before responding to the set of simulated file-related storage operation requests, (c) the storage system target function; and (d) rules for simulating file-related storage operation requests. | 04-28-2011 |
20110126173 | VERIFYING SYNCHRONIZATION COVERAGE IN LOGIC CODE - A computer implemented system and method for measuring synchronization coverage for one or more concurrently executed threads is provided. The method comprises updating an identifier of a first thread to comprise an operation identifier associated with a first operation, in response to determining that the first thread has performed the first operation; associating the identifier of the first thread with one or more resources accessed by the first thread; and generating a synchronization coverage model by generating a relational data structure of said one or more resources, wherein a resource is associated with at least the identifier of the first thread and an identifier of a second thread identifier, such that the second thread waits for the first thread before accessing said resource. | 05-26-2011 |
20110138138 | WRITE SET BOUNDARY MANAGEMENT FOR HETEROGENEOUS STORAGE CONTROLLERS IN SUPPORT OF ASYNCHRONOUS UPDATE OF SECONDARY STORAGE - A data storage system including at least one storage controller having a first color policy and operative to store data onto a first data storage unit at a primary site as part of a current color of the primary site, at least one storage controller having a second color policy and operative to store data onto a second data storage unit at the primary site as part of the current color, and a color control node operative to provide each of the controllers with new color information while maintaining the integrity of dependent writes across color boundaries. | 06-09-2011 |
20110145796 | SYNCHRONIZATION COVERAGE IN LOGIC CODE - A method for enhancing synchronization coverage for a logic code is provided. The method comprises tracking whether one or more code sections in the logic code are blocked by at least another code section in the logic code, or whether one or more code sections in the logic code are blocking at least another code section in the logic code, during one or more test runs; and including one or more delay mechanisms in the logic code to introduce a delay in execution of a first code section in the logic code, wherein length of introduced delay is dependent on whether the first code section was blocked by a second code section or whether the first code section was blocking the second code section. | 06-16-2011 |
20120078925 | SEARCHING WITHIN LOG FILES - A search tool may search a text file for entries matching one or more search criterions. The search tool may parse the file into entries. Entries may be parsed into lines and fields. A search criterion may define possible content in two or more fields and relationship between the two or more fields. The search criterion may be defined based on an exemplary entry of the text file, such as for example based on a selection of fields of the exemplary entry by a user. | 03-29-2012 |
20120130702 | VERIFICATION OF A COMPUTER PROGRAM IN RESPECT TO AN UNEXPECTED RESPONSE TO AN ACCESS REQUEST - Testing a computer program comprises identification of resource access requests by the computer program to a resource provided by an underlying host. The resource access requests may be intercepted and a determined response may be returned instead of the actual response of the underlying host. In some exemplary embodiments, the resource may a clock of the underlying host and the response may be the time of the clock. In some exemplary embodiments, the computer program may be tested to check for validity during execution on a cloud computing environment, in which access to resources may yield results that on a non-cloud computing environments are generally not expectable. The testing may be performed on a non-cloud computing environments and simulate scenarios applicable to cloud computing environments. | 05-24-2012 |
20120233596 | MEASURING COUPLING BETWEEN COVERAGE TASKS AND USE THEREOF - Test coverage is enhanced by measuring various types of coupling between coverage tasks. The coupling measurements may be implicit coupling measurements, explicit coupling measurements, coding coupling measurements, performance coupling measurements, resource coupling measurements or the like. Coupling scores are calculated for coverage tasks and based thereon ranking of the coverage tasks or groups of coverage tasks may be determined The ranking may be utilized in selecting for which uncovered coverage task a test should be designed. The ranking may be utilized in computing a coverage measurement of a test suite. The ranking may be utilized to rank tests, based on the coverage tasks each test covers. Ranking of tests may be utilized for various purposes such as performing test selection. | 09-13-2012 |
20120233614 | MEASURING COUPLING BETWEEN COVERAGE TASKS AND USE THEREOF - Test coverage is enhanced by measuring various types of coupling between coverage tasks. The coupling measurements may be implicit coupling measurements, explicit coupling measurements, coding coupling measurements, performance coupling measurements, resource coupling measurements or the like. Based on the coupling measurements, different coverage tasks may be grouped together. For example, closely coupled coverage tasks may be grouped together. The groups may also be determined based on an initial distribution of groups, by combining groups having closely coupled member coverage tasks. The groups may be ordered and prioritized, such as based on the size of the groups and the number of uncovered tasks in each group. The groups may also be ordered, such as based on coupling score which aggregate the coupling measurements of the member coverage tasks. | 09-13-2012 |
20120304155 | System, Method And Program Product For Executing A Debugger - A method for controlling a debugger, the method includes: determining whether to execute a certain breakpoint of the debugger in view of certain breakpoint conditional information and in view of at least one previous visit, during the execution of the debugger, to at least one other breakpoint of the debugger; and selectively executing the certain breakpoint in response to the determination. | 11-29-2012 |
20130024804 | Navigation History Tracking In a Content Viewing Environment - Systems and methods for monitoring user actions, while a user is viewing first content displayed on a display screen, wherein the user views a first portion of the first content within a first context that defines scope of view for the first content; determining whether the user's actions resulted in second content being displayed on the display screen; associating the first portion of the first content with the second content; and maintaining a record of the association between the first portion of the first content and the second content. | 01-24-2013 |
20130091382 | Modeling Test Space for System behavior with Optional Variable combinations - A method for modeling a test space is provided. The method comprises defining a coverage model including: one or more variables, wherein respective values for the variables are assigned, and one or more definitions for value combinations for said variables with assigned values, wherein at least one of said value combinations is defined as optional, and zero or more other said value combinations are defined as forbidden or mandatory for purpose of generating test scenarios to test a system for which the coverage model is defined. | 04-11-2013 |
20130110880 | TEST PLANNING USING ATTRIBUTE VALUE PROPERTIES | 05-02-2013 |
20130117005 | COVERAGE ANALYSIS FOR MULTIPLE TEST METHODOLOGIES - Systems and methods for constructing a model to test the functionality of a target system are provided. When a first test methodology is used to test the target system, a model is proposed to test the target system based on a second test methodology. A subset of the target system's properties covered by the model is selected according to the second test methodology. It is determined whether the selected subset of the target system's properties, as covered by the second test methodology, is covered by the first test methodology. | 05-09-2013 |
20130239094 | DETECTING LOCKING DISCIPLINE VIOLATIONS ON SHARED RESOURCES - Detecting locking discipline violations on shared resources. For example, a method of detecting locking discipline violations of shared resources of a computing platform, by a testing process to be executed concurrently with one or more other processes on said computing platform, the testing process comprising: locking a shared resource of said computing platform; reading a value of the shared resource; locally storing the value of the shared resource; rereading the value of the shared resource after a predefined time period; and generating a locking discipline violation report if the value of said shared resource as reread by said rereading is different from the value of said resource as locally stored by said locally storing. | 09-12-2013 |
20130262017 | METHOD AND APPARATUS FOR REUSING PARTS OF EXISTING TESTS - An apparatus, computer-implemented method performed by a computerized device and a computer program product, the method comprising: receiving an attribute collection related to a domain, the attribute collection comprising two or more attributes; receiving one or more restrictions, each restriction indicating one or more attributes, wherein a value for the attribute is to be selected from one existing test; receiving an existing test; and generating one or more new tests by setting values for the two or more attributes, wherein values for the one or more attributes of the one or more restrictions are selected from the existing test, and one or more values for one or more other attributes are not selected from the existing test. | 10-03-2013 |
20140137057 | Test Validation Planning - A computer-implemented method, computerized apparatus, and computer program product for test validation planning. The computer-implemented method, performed by a processor, comprising: having a test validation activity to be performed to validate results of two or more tests of a test suite; and automatically determining, by a processor, a subset of the two or more tests for which to perform the test validation activity; whereby avoiding performing duplicate validation activities. Optionally, for each test of the test suite a valuation of a set of functional attributes is available, and a subset of the functional attributes is deemed as relevant functional attributes with respect to the test validation activity. In such an embodiment, said determining is based on the valuation of the relevant functional attributes. | 05-15-2014 |
20140236564 | COVERAGE MODEL AND MEASUREMENTS FOR PARTIAL INSTRUMENTATION - A computer implemented method, an apparatus and a computer program product for instrumentation coverage. The method comprising: determining an instrumentation coverage model of a system having components, the instrumentation coverage model defining instrumentation tasks of the system, wherein each instrumentation task defines a subset of the components to be monitored; and monitoring the system by a computer, wherein during said monitoring applying a plurality of partial instrumentation tasks defining strict subsets of the components to be monitored. | 08-21-2014 |
20140281719 | EXPLAINING EXCLUDING A TEST FROM A TEST SUITE - A method, apparatus and product for explaining excluding a test from a test suite. In one embodiment, the method comprising: obtaining a reduced test suite covering test requirements, the reduced test suite excluding a test covering a subset of the test requirements; determining, by a processor, a subset of the reduced test suite covering the subset of the test requirements; and outputting an indication that the subset of the test requirements is covered by the subset of the reduced test suite. | 09-18-2014 |
20140317450 | PRETEST SETUP PLANNING - A computer-implemented method comprising: obtaining a description of a test suite which comprises a plurality of tests, wherein each test of the test suite is described by values of functional attributes, wherein at least a portion of the functional attributes are setup-related attributes, wherein a combination of values of the setup-relates attributes potentially indicate a setup activity to be performed prior to executing the test to set up a test environment for the test. Identifying, based on the description of the test suite, a setup activity that is associated with two or more tests, wherein the setup activity is configured to set up a component of the test environment, wherein the identifying is performed by a processor. Providing a first instruction to perform the setup activity prior to executing a first test of the two or more tests. And, providing a second instruction to reuse the component of the test environment when executing additional tests of the two or more tests, whereby avoiding performing duplicate setup activities. | 10-23-2014 |
20140372083 | DERIVED RESTRICTIONS IN A COMBINATORIAL MODEL - A method, apparatus and product for determining a derived restriction in a combinatorial model. The method comprising: obtaining a combinatorial model defining a test space, the combinatorial model comprising a set of attributes, a respective domain for each attribute, and a set of restrictions, wherein the restrictions define a combination of values of the attributes that are restricted from the test space; and automatically determining a derived restriction that is derived from at least a first restriction and a second restriction, the first and second restrictions are comprised by the set of restrictions, wherein the derived restriction restricts at least one combination of values that is not restricted by the first restriction and at least one combination of values that is not restricted by the second restriction. | 12-18-2014 |
20150046906 | TEST PLANNING WITH ORDER COVERAGE REQUIREMENTS - A method, apparatus and computer-implemented method, the method comprising: receiving a combinatorial testing model comprising an attribute collection, the attribute collection comprising a predetermined number of initial attributes, one or more possible values for each of the initial attributes, a coverage requirement, and an order coverage requirement for the initial attributes, the order coverage requirement related to predetermined relative order in which the attribute values are to be applied; and providing two or more tests in which each of the initial attributes is assigned a value from the possible values, wherein the tests satisfy the order coverage requirement for the at least two attributes. | 02-12-2015 |