Pareon Verify. Test suite for dynamic software verification. Detect the hard-to-find errors other tools can t
|
|
- Bruno Carroll
- 7 years ago
- Views:
Transcription
1 Pareon Verify Test suite for dynamic software verification Detect the hard-to-find errors other tools can t We are going to definitely incorporate the Vector Fabrics tools as an important part of our quality offering Copyright 2016 Vector Fabrics B.V. Jan Asselman Quality team leader / Altran Intelligent Systems
2 Avoid software errors and high repair costs with Pareon Verify Test suite for dynamic software verification finds difficult-to-detect software errors and makes lengthy debugging sessions a thing of the past. Software in embedded systems has become fundamental to the daily infrastructure of our economy, infrastructure, and daily life. And, the amount of embedded software whether in cell phones, automobiles, airplanes or medical devices has exploded in size and complexity. The result: an exponential growth in the potential and number of software errors or bugs. Cost of an error A NASA study 1 shows the cost of fixing a software error found in the field as 100x more expensive than finding the same error during development. The common use of dynamic memory allocation and multithreading in C++ triggers a new category of errors that are hard to detect using the traditional testing tools and methods. Errors are expensive Repairing software errors once the product has released or is in the field involves significantly higher costs, even without accounting for damage to the brand and corporate image. Development Testing In the field The cost of a software defect error mounts exponentially the longer it takes to identify and fix. To contain cost and financial risk, it is crucial to detect and correct errors during development - before the product enters the market. 1: It is more important than ever to effectively and thoroughly test software before it is shipped. 2 Copyright 2016 Vector Fabrics B.V.
3 Car Sofware Average high-end car F-35 Fighter Jet 2013 Boeing 787 Total flight software *million lines of code 19,4 21,4 8,5 30,1 20,6 % Single processor % Multi processor % Multi core % Multi core & Multi processor % Don t know Today s code includes millions of lines of code and increased use of multicore and multiprocessor systems has magnified complexity and introduced timing challenges. The result: more software errors that can only be found through dynamic analysis. 100 million lines of complex code Today s automobiles and airplanes commonly depend on a plethora of processors some of them multicore to run over 100 million lines of code. And, with the adoption of multicore devices, code complexity has reached new heights. As the amount and complexity of code increases, so does the number of coding errors. Worse, finding those errors is infinitely more challenging in a multithreaded, multicore environment, which brings new challenges to software correctness and verification. Increasingly dynamic behavior Modern software testers must cope with the everincreasing dynamic behavior of the software. Dynamic memory use and multithreading, for example, is far harder to test as the bugs are hard to reproduce, but their consequences buffer overflows, memory leaks, and invalid memory accesses lead to significant system failures. Heisenbugs The criticality of system timing has bred a new category of software error called Heisenbug so named after the uncertainty principle discovered by Theoretical Physicist Werner Heisenberg. Heisenbugs are hard to diagnose because they tend to disappear because the debug process affects run-time performance enough that the bugs don t show up. Detecting and resolving Heisenbugs is therefore extremely complex and costly. Validating software without dynamic analysis is no longer effective. Software projects are growing in size and the hardware running the software is becoming increasingly sophisticated. Without dynamic analysis, the complex software errors remain undetected and cause problems later. Pareon Verify automates dynamic analysis Because of the new debug challenges, Vector Fabrics developed Pareon Verify a tool for dynamic software verification. Pareon Verify automates dynamic analysis of large volumes of source code in order to detect software errors that cannot be identified using other tools or methods. Increasing size and complexity of applications cause more errors to occur in software. Copyright 2016 Vector Fabrics B.V. 3
4 The advantages of dynamic code analysis Dynamic analysis or runtime analysis, as it s sometimes called can be seen as an MRI scanner for software. By looking inside the application while it executes, Pareon Verify detects errors in the internal behavior. By observing the application s internal structures and behavior, it identifies where errors originate and, in doing so, pinpoints the primary cause of the error. This way, dynamic analysis identifies errors that remain undetected during other tests. Limits of existing methods Errors in dynamic behavior are notoriously difficult to detect with traditional testing tools and methods. Such errors typically aren t triggered when the application is run in its normal testing environment, but cause problems when environment, timing, or circumstances change. Dynamic analysis looks at the entire application and is not limited to a local unit scope in its error detection. Additionally, as it looks inside the application to see errors in individual operations in a white-box fashion, it reports application errors even if that error does not cause the application to fail its black-box test on a particular test case. For these reasons, dynamic code analysis plays a critical role in comprehensive software testing. Dynamic analysis complements static code analysis and unit testing while offering the key advantage of revealing the most expensive errors that would otherwise remain undetected. Dynamic analysis Heisenbugs Static analysis is limited in its capability to predict the dynamic behavior of code and cannot foresee all possible combinations of inputs, code paths, dynamic memory, and thread timing of the full application. Cost of an error Unit & system tests Static analysis Coding style checks Functional errors Coding errors Coding style violations Similarly, unit testing is limited in its scope to a smaller part of the application. It cannot detect errors caused by the application s global behavior or environment. The dynamic analysis edge Dynamic analysis is not hindered by these limitations. It observes the application s actual operation during execution. It can see all the combinations of dynamic and global behavior triggered during execution, regardless of complexity. Compilation Syntax errors Dynamic analysis reveals the most expensive and allusive bugs in the software verification process. 4 Copyright 2016 Vector Fabrics B.V.
5 How it works? Dynamic analysis begins by instrumenting the target application to trace the behavior taking place inside the application. The instrumentation in the application binary creates a stream of events also called a trace that is captured by the analyzer and studied for behavioral errors. The analyzer then reports the errors in a clear and concise way with detailed references to source code for easy correction of the error. Pareon Verify detects a range of hard-to-detect software errors. When integrated into the development process, Pareon Verify can continuously screen for errors as software changes take place. Pareon Verify verifies software using the following steps: 1. Compile Pareon Verify s instrumenting C and C++ compiler becomes a drop-in replacement for the (cross) compiler and a build can be setup within minutes. 2. Execute Pareon Verify executes the instrumented code on a host PC or embedded target using representative input data or test suite. 3. Analyze The resulting execution trace is conveniently analyzed on the host PC to minimize the impact of analysis on target memory and performance. 4. Resolve bugs Detailed error messages quickly identify the problem and show developers how to fix the error, including variable names and full call stacks. No false positives! Invalid memory access Array out-of-bounds Uninitialized memory reads Use-after-free Race conditions Memory leaks Invalid pointer usage and buffer overflows due to bad pointer arithmetic, etc. Access outside a buffer or by using wrong indexes into a multidimensional array Use of variables that have not been written yet, generally leading to data corruption or crashes Use of dangling pointers that point to memory that no longer exists Access to the same data from multiple threads without proper synchronization, which generally leads to data corruption Improper memory management causing the system slow down or loss of memory Pareon Verify uncovers hard-to-detect software errors, saving developers tremendous time and cost. Copyright 2016 Vector Fabrics B.V. 5
6 Write 10? Breaking the multicore challenge 10 Read Even a cell phone includes up to eight cores these days, creating a tremendous software challenge for developers. So-called data races already possible in single core applications with interrupts have become much more widespread as multithreaded programs run parallel threads. Time Thread A Shared memory Normal operation: read value 10 A read and write from different threads to shared memory.? Thread B Data races, caused by two threads accessing the same variable without proper synchronization, result in threads reading stale or incorrect data when data corruption has occurred. Since multi-threaded programs have more dynamic behavior, they are more susceptible to dynamic software errors. With Pareon Verify, we are now able to detect and fix some really difficult bugs much earlier in development. It took us a few hours to fix the problem instead of a week or longer. Daniele Lacamera Lead developer / PicoTCP Read Write Time Thread A Shared memory Thread B Data race: read of uninitialized data A data race occurs when the timing changes. The read now takes place before the write is done, resulting in a read of uninitialized data. 6 Copyright 2016 Vector Fabrics B.V.
7 Solving errors early through continuous integration Many software development companies deploy a development process called continuous integration. When a developer checks in a new piece of code, a central server builds and runs a set of tests on all source code. If any of the tests fail, the newly submitted code is rejected and the developer has to fix it. This allows developers to find and fix errors earlier in the process while they re still working on the code and it is still fresh on their mind. This ensures that fixes are done faster. Pareon Verify delivers: Fewer errors in the field By capturing the errors before the product is deployed, companies can reduce maintenance costs of software and maintain a high level of customer satisfaction and brand reputation. An error found during testing is six times more expensive than one found during development and up to 100 times more expensive when found in the field. Using Pareon Verify, dynamic analysis can become part of the continuous integration process. Instead of just receiving a pass or fail from the automated tests, Pareon Verify also reports: if the code flow leading to the verdict is correct; if the test result is only correct by accident; if there are unwanted side effects. The benefits: the developer can correct the error immediately even before it triggers a test case to fail and a crash to happen, saving a lot of time and costs in the system development. To reduce maintenance costs, it is essential that errors be removed from a software design as early as possible. A well-known Japanese car manufacturer notably had to issue recalls for problems that were linked to software errors in a number of its models. These are estimated to have costed the company two billion dollars, not to mention the damage to its corporate image. Improved time to market Often, during the integration and system testing phase, the number of bugs found by the test team only grows. Developers cannot tell when they revisions are complete as issue might be hiding the next. As a result, project and release schedules tend to slip, delaying the release or the end of the project. With Pareon Verify, companies can dramatically slash the time needed to debug and correct errors. This in turn reduces the risk of project delays. In practice, this can result in weeks worth of time saved and a more predictable test and integration phase. Summary Pareon Verify helps companies build software that can be brought to market more quickly, with less cost, and with fewer errors By using Pareon Verify, software companies improve brand reputation and customer satisfaction. Pareon Verify enables its customers product success. For more information about Pareon Verify, please visit: Copyright 2016 Vector Fabrics B.V. 7
8 About Vector Fabrics Vector Fabrics specializes in development and testing tools for the complex software used in embedded systems, such as automotive, IOT devices, network equipment, consumer electronics, aerospace, medical and industrial systems. The Pareon family of dynamic analysis tools provides customers with deep insight into how their software will behave when executed. This insight ensures a higher level of reliability, safety, and performance. Using these tools, businesses can identify and fix costly software bugs and improve product time-to-market. Hogeweg 39A 5301 LJ Zaltbommel The Netherlands Phone info@vectorfabrics.com Copyright 2016 Vector Fabrics B.V. All Rights Reserved.
Oracle Solaris Studio Code Analyzer
Oracle Solaris Studio Code Analyzer The Oracle Solaris Studio Code Analyzer ensures application reliability and security by detecting application vulnerabilities, including memory leaks and memory access
More informationTOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT
TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT Go beyond error detection to ensure safety and security TABLE OF CONTENTS The Three Biggest Challenges...4 Ensure compliance
More informationThere are a number of factors that increase the risk of performance problems in complex computer and software systems, such as e-commerce systems.
ASSURING PERFORMANCE IN E-COMMERCE SYSTEMS Dr. John Murphy Abstract Performance Assurance is a methodology that, when applied during the design and development cycle, will greatly increase the chances
More informationCoverity White Paper. Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing
Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing The Stakes Are Rising Security breaches in software and mobile devices are making headline news and costing companies
More informationEnsuring Code Quality in Multi-threaded Applications
Ensuring Code Quality in Multi-threaded Applications How to Eliminate Concurrency Defects with Static Analysis Ben Chelf, CTO Introduction Most developers would agree that consumers of software today continually
More informationModule 10. Coding and Testing. Version 2 CSE IIT, Kharagpur
Module 10 Coding and Testing Lesson 23 Code Review Specific Instructional Objectives At the end of this lesson the student would be able to: Identify the necessity of coding standards. Differentiate between
More informationMinimizing code defects to improve software quality and lower development costs.
Development solutions White paper October 2008 Minimizing code defects to improve software quality and lower development costs. IBM Rational Software Analyzer and IBM Rational PurifyPlus software Kari
More informationEliminate Memory Errors and Improve Program Stability
Eliminate Memory Errors and Improve Program Stability with Intel Parallel Studio XE Can running one simple tool make a difference? Yes, in many cases. You can find errors that cause complex, intermittent
More informationUsing System Tracing Tools to Optimize Software Quality and Behavior
Using System Tracing Tools to Optimize Software Quality and Behavior Thomas Fletcher, Director, Automotive Solutions QNX Software Systems Ltd. thomasf@qnx.com Gaining Insight At one time, embedded devices
More informationBest Practices for Verification, Validation, and Test in Model- Based Design
2008-01-1469 Best Practices for Verification, Validation, and in Model- Based Design Copyright 2008 The MathWorks, Inc. Brett Murphy, Amory Wakefield, and Jon Friedman The MathWorks, Inc. ABSTRACT Model-Based
More informationSecure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Testing and Source Code Auditing Secure Software Programming 2 Overview
More informationControlling Software Complexity. The Business Case for Static Source Code Analysis
Controlling Software Complexity The Business Case for Static Source Code Analysis Table of Contents 1. Introduction 2. Defects and Software Quality 3. The Business Challenge of Software 4. The Impact of
More informationAPPROACHES TO SOFTWARE TESTING PROGRAM VERIFICATION AND VALIDATION
1 APPROACHES TO SOFTWARE TESTING PROGRAM VERIFICATION AND VALIDATION Validation: Are we building the right product? Does program meet expectations of user? Verification: Are we building the product right?
More informationAn Easier Way for Cross-Platform Data Acquisition Application Development
An Easier Way for Cross-Platform Data Acquisition Application Development For industrial automation and measurement system developers, software technology continues making rapid progress. Software engineers
More informationHow to hear the Web Seminar
How to hear the Web Seminar Click on Communicate in the top menu bar Select Integrated Voice Conference in the drop down Click Join to join the conference You will be able to listen to the presenter through
More informationCarlos Villavieja, Nacho Navarro {cvillavi,nacho}@ac.upc.edu. Arati Baliga, Liviu Iftode {aratib,liviu}@cs.rutgers.edu
Continuous Monitoring using MultiCores Carlos Villavieja, Nacho Navarro {cvillavi,nacho}@ac.upc.edu Arati Baliga, Liviu Iftode {aratib,liviu}@cs.rutgers.edu Motivation Intrusion detection Intruder gets
More informationSoftware Engineering for LabVIEW Applications. Elijah Kerry LabVIEW Product Manager
Software Engineering for LabVIEW Applications Elijah Kerry LabVIEW Product Manager 1 Ensuring Software Quality and Reliability Goals 1. Deliver a working product 2. Prove it works right 3. Mitigate risk
More informationApplication Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
More informationWhite paper. Registry Optimization: Beyond Registry Cleaning
White paper Registry Optimization: Beyond Registry Cleaning Stay Tuned Registry Optimization: Beyond Registry Cleaning The registry is one of the most critical components of your PC. It holds settings
More informationcase study Coverity Maintains Software Integrity of Sun Microsystems Award-Winning Storage Products
case study Coverity Maintains Software Integrity of Sun Microsystems Award-Winning Storage Products 25% of the defects identified by Coverity would have stalled a product launch and delayed time to market
More informationThe ROI from Optimizing Software Performance with Intel Parallel Studio XE
The ROI from Optimizing Software Performance with Intel Parallel Studio XE Intel Parallel Studio XE delivers ROI solutions to development organizations. This comprehensive tool offering for the entire
More informationMonitoring Java enviroment / applications
Monitoring Java enviroment / applications Uroš Majcen uros@quest-slo.com Java is Everywhere You Can Expect More. Java in Mars Rover With the help of Java Technology, and the Jet Propulsion Laboratory (JPL),
More informationBuilding Secure Software at Enterprise Scale
Building Secure Software at Enterprise Scale EXECUTIVE SUMMARY There are innovative methods for performing static analysis of application code that results in secure, higher-quality software at a significantly
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Improving Software Quality to Drive Business Agility Sponsored by: Coverity Inc. Melinda-Carol Ballou June 2008 IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200
More informationCoverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects
Effective Management of Static Analysis Vulnerabilities and Defects Introduction According to a recent industry study, companies are increasingly expanding their development testing efforts to lower their
More informationGETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS
Embedded Systems White Paper GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS September 2009 ABSTRACT Android is an open source platform built by Google that includes an operating system,
More informationChapter 8 Software Testing
Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is
More informationInterpreters and virtual machines. Interpreters. Interpreters. Why interpreters? Tree-based interpreters. Text-based interpreters
Interpreters and virtual machines Michel Schinz 2007 03 23 Interpreters Interpreters Why interpreters? An interpreter is a program that executes another program, represented as some kind of data-structure.
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5, No. 6, July - August 2006 On Assuring Software Quality and Curbing Software
More informationEffective Software Verification for Medical Devices
STERLINGTECH AND KLOCWORK WHITE PAPER NOVEMBER 2009 Effective Software Verification for Medical Devices Achieving compliance and meeting productivity goals with static analysis In addition to producing
More informationIntegrated Error-Detection Techniques: Find More Bugs in Java Applications
Integrated Error-Detection Techniques: Find More Bugs in Java Applications Software verification techniques such as pattern-based static code analysis, runtime error detection, unit testing, and flow analysis
More informationSquashing the Bugs: Tools for Building Better Software
Squashing the Bugs: Tools for Building Better Software Stephen Freund Williams College The Blue Screen of Death (BSOD) USS Yorktown Smart Ship 27 Pentium-based PCs Windows NT 4.0 September 21, 1997: data
More informationSatisfying ASIL Requirements with Parasoft C++test Achieving Functional Safety in the Automotive Industry
Satisfying Requirements with Parasoft C++test Achieving Functional Safety in the Automotive Industry Introduction Safety functions are increasingly being carried out by electrical, electronic, or programmable
More informationTesting Automation for Distributed Applications By Isabel Drost-Fromm, Software Engineer, Elastic
Testing Automation for Distributed Applications By Isabel Drost-Fromm, Software Engineer, Elastic The challenge When building distributed, large-scale applications, quality assurance (QA) gets increasingly
More informationChap 1. Software Quality Management
Chap 1. Software Quality Management Part 1.1 Quality Assurance and Standards Part 1.2 Software Review and Inspection Part 1.3 Software Measurement and Metrics 1 Part 1.1 Quality Assurance and Standards
More informationThe ROI of Test Automation
The ROI of Test Automation by Michael Kelly www.michaeldkelly.com Introduction With the exception of my first project team out of college, in every project team since, I ve had to explain either what automated
More informationDevelopment Testing for Agile Environments
Development Testing for Agile Environments November 2011 The Pressure Is On More than ever before, companies are being asked to do things faster. They need to get products to market faster to remain competitive
More informationSoftware Testing. Knowledge Base. Rajat Kumar Bal. Introduction
Software Testing Rajat Kumar Bal Introduction In India itself, Software industry growth has been phenomenal. IT field has enormously grown in the past 50 years. IT industry in India is expected to touch
More informationLecture 17: Testing Strategies" Developer Testing"
Lecture 17: Testing Strategies Structural Coverage Strategies (White box testing): Statement Coverage Branch Coverage Condition Coverage Data Path Coverage Function Coverage Strategies (Black box testing):
More informationChapter 17 Software Testing Strategies Slide Set to accompany Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For
More informationChapter 2: OS Overview
Chapter 2: OS Overview CmSc 335 Operating Systems 1. Operating system objectives and functions Operating systems control and support the usage of computer systems. a. usage users of a computer system:
More informationComprehensive Static Analysis Using Polyspace Products. A Solution to Today s Embedded Software Verification Challenges WHITE PAPER
Comprehensive Static Analysis Using Polyspace Products A Solution to Today s Embedded Software Verification Challenges WHITE PAPER Introduction Verification of embedded software is a difficult task, made
More informationBackupEnabler: Virtually effortless backups for VMware Environments
White Paper BackupEnabler: Virtually effortless backups for VMware Environments Contents Abstract... 3 Why Standard Backup Processes Don t Work with Virtual Servers... 3 Agent-Based File-Level and Image-Level
More informationAutomated Module Testing of Embedded Software Systems
Automated Module Testing of Embedded Software Systems Master s Thesis Fredrik Olsson Henrik Lundberg Supervisors Thomas Thelin, LTH Michael Rosenberg, EMP Nicklas Olofsson, EMP II Abstract When designing
More informationSoftware: Driving Innovation for Engineered Products. Page
Software: Driving Innovation for Engineered Products Software in products holds the key to innovations that improve quality, safety, and ease-of-use, as well as add new functions. Software simply makes
More informationThreat Modeling for Secure Embedded Software
SECURITY INNOVATION & KLOCWORK WHITE PAPER JUNE 2011 Threat Modeling for Secure Embedded Software As embedded software becomes more ubiquitous and connected powering everything from home appliances and
More informationLeak Check Version 2.1 for Linux TM
Leak Check Version 2.1 for Linux TM User s Guide Including Leak Analyzer For x86 Servers Document Number DLC20-L-021-1 Copyright 2003-2009 Dynamic Memory Solutions LLC www.dynamic-memory.com Notices Information
More informationYour guide to DevOps. Bring developers, IT, and the latest tools together to create a smarter, leaner, more successful coding machine
Your guide to DevOps Bring developers, IT, and the latest tools together to create a smarter, leaner, more successful coding machine Introduction The move to DevOps involves more than new processes and
More informationcalibrate confidence with Risk Management: The Critical Role of Measurement and Calibration WHITE PAPER SERVICES
calibrate with confidence The Critical Role of Measurement and Calibration The ultimate goal of your company is to be profitable in providing a superior, effective, and safe product or service. Your use
More informationElevating the Customer Experience in the Mobile World
Elevating the Customer Experience in the Mobile World Mobile devices are now an ever-present feature of our daily lives Tablets, phones, watches we rely on them and the applications and services that they
More informationHotpatching and the Rise of Third-Party Patches
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov asotirov@determina.com BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments
More informationSmarter wireless networks
IBM Software Telecommunications Thought Leadership White Paper Smarter wireless networks Add intelligence to the mobile network edge 2 Smarter wireless networks Contents 2 Introduction 3 Intelligent base
More informationDeveloping Software in a Private workspace - 4.01 PM PMS
SBCH06.fm Page 67 Friday, October 4, 2002 4:01 PM 6 Private Workspace A government clerk s room, showing a desk with books, telephone and directory, and a desk lamp on it. Washington, D.C., 1939. Photo
More informationControlling Software Complexity
Controlling Software Complexity The Business Case for Static Source Code Analysis Ben Chelf, Coverity CTO Andy Chou, Coverity Chief Scientist Introduction Software developers today face significant opportunities
More informationIN THIS WHITE PAPER EXECUTIVE SUMMARY. Sponsored by: IBM. September 2004
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Total Cost of Ownership for Point-of-Sale and PC Cash Drawer Solutions: A Comparative
More informationWhat Is Specific in Load Testing?
What Is Specific in Load Testing? Testing of multi-user applications under realistic and stress loads is really the only way to ensure appropriate performance and reliability in production. Load testing
More informationPattern Insight Clone Detection
Pattern Insight Clone Detection TM The fastest, most effective way to discover all similar code segments What is Clone Detection? Pattern Insight Clone Detection is a powerful pattern discovery technology
More informationEmbracing Microsoft Vista for Enhanced Network Security
Embracing Microsoft Vista for Enhanced Network Security Effective Implementation of Server & Domain Isolation Requires Complete Network Visibility throughout the OS Migration Process For questions on this
More informationDelivering Fat-Free CDP with Delphix. Using Database Virtualization for Continuous Data Protection without Storage Bloat.
Delivering Fat-Free CDP with Delphix Using Database Virtualization for Continuous Data Protection without Storage Bloat White Paper Delivering Fat- Free CDP with Delphix Revision: June 2012 You can find
More informationSoftware Tracing of Embedded Linux Systems using LTTng and Tracealyzer. Dr. Johan Kraft, Percepio AB
Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer Dr. Johan Kraft, Percepio AB Debugging embedded software can be a challenging, time-consuming and unpredictable factor in development
More informationPREDICTING SOFTWARE FAULTS
PREDICTING SOFTWARE FAULTS Jay Naphas Federal Aviation Administration/AST-300, 800 Independence Avenue SW, Washington, DC 20591, USA, Jay.Naphas@faa.gov ABSTRACT At first glance, software faults appear
More informationVerification and Validation of Software Components and Component Based Software Systems
Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research christina.wallin@mdh.se
More informationx64 Servers: Do you want 64 or 32 bit apps with that server?
TMurgent Technologies x64 Servers: Do you want 64 or 32 bit apps with that server? White Paper by Tim Mangan TMurgent Technologies February, 2006 Introduction New servers based on what is generally called
More informationA Study on the Scalability of Hybrid LS-DYNA on Multicore Architectures
11 th International LS-DYNA Users Conference Computing Technology A Study on the Scalability of Hybrid LS-DYNA on Multicore Architectures Yih-Yih Lin Hewlett-Packard Company Abstract In this paper, the
More informationCSCI E 98: Managed Environments for the Execution of Programs
CSCI E 98: Managed Environments for the Execution of Programs Draft Syllabus Instructor Phil McGachey, PhD Class Time: Mondays beginning Sept. 8, 5:30-7:30 pm Location: 1 Story Street, Room 304. Office
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE, AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE, AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Defect Management and Reporting Domain: Application Domain Date Issued:
More informationLinux Kernel. Security Report
Linux Kernel Security Report September 25 Authors: Andy Chou, Bryan Fulton and Seth Hallem Coverity has combined two years of analysis work carried out in a commercial setting at Coverity with four years
More informationWhite Paper 6 Steps to Enhance Performance of Critical Systems
White Paper 6 Steps to Enhance Performance of Critical Systems Despite the fact that enterprise IT departments have invested heavily in dynamic testing tools to verify and validate application performance
More informationHow SafeVelocity Improves Network Transfer of Files
How SafeVelocity Improves Network Transfer of Files 1. Introduction... 1 2. Common Methods for Network Transfer of Files...2 3. Need for an Improved Network Transfer Solution... 2 4. SafeVelocity The Optimum
More informationIncreasing software development productivity with reversible debugging
Increasing software development productivity with reversible debugging A white paper by Undo Software 1 Table of contents Table of contents 2 1. Management summary 3 1.1 The growing importance of debugging
More informationare you helping your customers achieve their expectations for IT based service quality and availability?
PARTNER BRIEF Service Operations Management from CA Technologies are you helping your customers achieve their expectations for IT based service quality and availability? FOR PARTNER USE ONLY DO NOT DISTRIBUTE
More informationTopics in Website Testing. [Reading assignment: Chapter 14, pp. 211-227]
Topics in Website Testing [Reading assignment: Chapter 14, pp. 211-227] How to test a website Easiest way to start is by treating the web site as a black box. Look at a sample website such as www.apple.com
More informationReal-User Monitoring A Competitive Edge for ASPs CORADIANT. December 2005. Telephone: 1-877-731-7277. Email: info@coradiant.com
Real-User Monitoring A Competitive Edge for ASPs December 2005 CORADIANT Telephone: 1-877-731-7277 Email: info@coradiant.com Coradiant, Inc. 2005 A Competitive Edge for ASPs Page 2 Introduction Organizations
More informationLearning Course Curriculum
Learning Course Curriculum Security Compass Training Learning Curriculum. Copyright 2012. Security Compass. 1 It has long been discussed that identifying and resolving software vulnerabilities at an early
More informationControlling Risk Through Software Code Governance
Controlling Risk Through Software Code Governance July 2011 Catastrophic Consequences Today s headlines are filled with stories about catastrophic software failures and security breaches; medical devices
More informationStatic vs. Dynamic Testing How Static Analysis and Run-Time Testing Can Work Together. Outline
Static vs. Dynamic Testing How Static Analysis and Run-Time Testing Can Work Together S. Tucker Taft and Brian Lesuer SQGNE December 2006 Outline The Challenges Facing Software Testing A Software Testing
More informationIBM Tivoli Composite Application Manager for WebSphere
Meet the challenges of managing composite applications IBM Tivoli Composite Application Manager for WebSphere Highlights Simplify management throughout the Create reports that deliver insight into life
More informationLoad Testing and Monitoring Web Applications in a Windows Environment
OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows
More informationCompute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005
Compute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005 Compute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005... 1
More informationEmbedded Systems Conference / Boston, MA September 20, 2007. ESC-302 Stress Testing Embedded Software Applications
Embedded Systems Conference / Boston, MA September 20, 2007 ESC-302 Stress Testing Embedded Software Applications T. Adrian Hill Johns Hopkins University Applied Physics Laboratory Adrian.Hill@jhuapl.edu
More informationTroubleshooting.NET Applications - Knowing Which Tools to Use and When
Troubleshooting.NET Applications - Knowing Which Tools to Use and When Document Version 1.0 Abstract There are three fundamental classifications of problems encountered with distributed applications deployed
More informationApplication Performance Testing Basics
Application Performance Testing Basics ABSTRACT Todays the web is playing a critical role in all the business domains such as entertainment, finance, healthcare etc. It is much important to ensure hassle-free
More information5 Steps to Adopting Agile IT Infrastructure Monitoring Necessary for a Customer-Driven World
5 Steps to Adopting Agile IT Infrastructure Monitoring Necessary for a Customer-Driven World Fueling the Application Experience If you ve seen recent car ads, you know they re as likely to promote applications
More informationImprove Fortran Code Quality with Static Analysis
Improve Fortran Code Quality with Static Analysis This document is an introductory tutorial describing how to use static analysis on Fortran code to improve software quality, either by eliminating bugs
More informationDebugging A MotoHawk Application using the Application Monitor
CONTROL SYSTEM SOLUTIONS Debugging A MotoHawk Application using the Application Monitor Author(s): New Eagle Consulting 3588 Plymouth Road, #274 Ann Arbor, MI 48105-2603 Phone: +1 (734) 929-4557 Ben Hoffman
More informationFramework for Injecting the Attacks and Analyzing the Behaviour of Vulnerability on Server s
Framework for Injecting the Attacks and Analyzing the Behaviour of Vulnerability on Server s Panchamukesh Ch #1, Kumar.J *2, Neelima.S *3, Sailaja.D *4 #1 Department of CSE, HITAM, Gowdavally, Hyderabad,
More informationSoftware testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
More informationPerformance rule violations usually result in increased CPU or I/O, time to fix the mistake, and ultimately, a cost to the business unit.
Is your database application experiencing poor response time, scalability problems, and too many deadlocks or poor application performance? One or a combination of zparms, database design and application
More informationReal-time Debugging using GDB Tracepoints and other Eclipse features
Real-time Debugging using GDB Tracepoints and other Eclipse features GCC Summit 2010 2010-010-26 marc.khouzam@ericsson.com Summary Introduction Advanced debugging features Non-stop multi-threaded debugging
More informationData Management for Portable Media Players
Data Management for Portable Media Players Table of Contents Introduction...2 The New Role of Database...3 Design Considerations...3 Hardware Limitations...3 Value of a Lightweight Relational Database...4
More informationWhite Paper. Managed IT Services as a Business Solution
White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...
More informationGrowing MSP Uncovers Huge Service Efficiencies With Network Infrastructure RMM
Growing MSP Uncovers Huge Service Efficiencies With Network Infrastructure RMM Network Doctor is a growing managed services provider (MSP) focused on providing a white glove level of service to its 80
More informationThe Value of High-Performance Computing for Simulation
White Paper The Value of High-Performance Computing for Simulation High-performance computing (HPC) is an enormous part of the present and future of engineering simulation. HPC allows best-in-class companies
More informationCoverity Scan. Big Data Spotlight
Coverity Scan Big Data Spotlight Coverity Scan Service The Coverity Scan service began as the largest public-private sector research project in the world focused on open source software quality and security.
More informationOverview and History of Operating Systems
Overview and History of Operating Systems These are the notes for lecture 1. Please review the Syllabus notes before these. Overview / Historical Developments An Operating System... Sits between hardware
More informationAn Accenture Point of View. Oracle Exalytics brings speed and unparalleled flexibility to business analytics
An Accenture Point of View Oracle Exalytics brings speed and unparalleled flexibility to business analytics Keep your competitive edge with analytics When it comes to working smarter, organizations that
More informationETL-EXTRACT, TRANSFORM & LOAD TESTING
ETL-EXTRACT, TRANSFORM & LOAD TESTING Rajesh Popli Manager (Quality), Nagarro Software Pvt. Ltd., Gurgaon, INDIA rajesh.popli@nagarro.com ABSTRACT Data is most important part in any organization. Data
More informationArticle. Electronic Notary Practices. Copyright Topaz Systems Inc. All rights reserved.
Article Electronic Notary Practices Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents Key Features and
More informationStatic Analysis of the Mars Exploration Rover Flight Software
Static Analysis of the Mars Exploration Rover Flight Software Guillaume Brat Kestrel Technology brat@email.arc.nasa.gov Roger Klemm California Institute of Technology roger.klemm@jpl.nasa.gov Abstract
More information