Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...ICSM 2011
Paper: "Precise Detection of Un-Initialized Variables in Large, Real-life COBOL Programs in Presence of Un-realizable Paths"
Authors: Rahul Jiresal, Adnan Contractor and Ravindra Naik
Session: Industry Track Session 4: Program analysis and Verification
Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...ICSM 2011
Paper: An Evaluation of the Strategies of Sorting, Filtering, and Grouping API Methods for Code Completion
Authors: Daqing Hou and Dave Pletcher
Session: Research Track Session 8 -Program Comprehension
Paper: SCOTCH: Improving Test-to-Code Traceability using Slicing and Conceptual Coupling
Authors: Abdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, David Binkley
Session: Research Track Session 3: Dynamic Analysis
Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...ICSM 2011
Paper: "Precise Detection of Un-Initialized Variables in Large, Real-life COBOL Programs in Presence of Un-realizable Paths"
Authors: Rahul Jiresal, Adnan Contractor and Ravindra Naik
Session: Industry Track Session 4: Program analysis and Verification
Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...ICSM 2011
Paper: An Evaluation of the Strategies of Sorting, Filtering, and Grouping API Methods for Code Completion
Authors: Daqing Hou and Dave Pletcher
Session: Research Track Session 8 -Program Comprehension
Paper: SCOTCH: Improving Test-to-Code Traceability using Slicing and Conceptual Coupling
Authors: Abdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, David Binkley
Session: Research Track Session 3: Dynamic Analysis
ERA - A Comparison of Stemmers on Source Code Identifiers for Software SearchICSM 2011
Paper: A Comparison of Stemmers on Source Code Identifiers for Software
Search
Authors: Andrew Wiese, Valerie Ho, Emily Hill.
Session: ERA1 - Linguistic Analysis of Software Artifacts
Industry - Testing & Quality Assurance in Data Migration Projects ICSM 2011
Paper: Testing & Quality Assurance in Data Migration Projects
Authors: Klaus Haller, Florian Matthes, Christopher Schulz
Session: Industry Track Session 3: Evolution and migration
Natural Language Analysis - Mining Java Class Naming ConventionsICSM 2011
Paper: Mining Java Class Naming Conventions
Authors: Simon Butler, Michel Wermelinger, Yijun Yu and Helen Sharp
Session: Research Track 4 - Natural Language Analysis
Industry - Evolution and migration - Incremental and Iterative Reengineering ...ICSM 2011
Paper: Incremental and Iterative Reengineering towards Software Product Line: An Industrial Case Study
Authors: Gang Zhang, Liwei Shen, Xin Peng, Zhenchang Xing and Wenyun Zhao
Session: Industry Track Session 3: Evolution and migration
Industry - Estimating software maintenance effort from use cases an indu...ICSM 2011
Paper: Estimating Software Maintenance Effort from Use Cases: an Industrial Case Study
Authors:Yan Ku, Jing Du, Ye Yang, Qing Wang
Session: Industry Tracking 5: Metrics and
Estimation
Industry - The Evolution of Information Systems. A Case Study on Document Man...ICSM 2011
Paper : The Evolution of Information Systems. A Case Study on Document Management
Authors : Paolo Salvaneschi
Session: Industry Track Session 3: Evolution and migration
Components - Crossing the Boundaries while Analyzing Heterogeneous Component-...ICSM 2011
Paper: "Crossing the Boundaries while Analyzing Heterogeneous Component-Based Software Systems"
Authors: Amir Reza Yazdanshenas, Leon Moonen
Session: Research Track Session 7: Components
Abstract:
Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, which is a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims. In this talk, I will report on our efforts to take control of the Torpig botnet for ten days. Over this period, we observed more than 180 thousand infections and recorded more than 70 GB of data that the bots collected.
While botnets have been hijacked before, the Torpig botnet exhibits certain properties that make the analysis of the data particularly interesting. First, it is possible (with reasonable accuracy) to identify unique bot infections and relate that number to the more than 1.2 million IP addresses that contacted our command and control server during the ten day period. This shows that botnet estimates that are based on IP addresses are likely to report inflated numbers. Second, the Torpig botnet is large, targets a variety of applications, and gathers a rich and diverse set of information from the infected victims. This allowed us to perform interesting data analysis that goes well beyond simply counting the number of stolen credit cards. In this talk I will discuss the analysis that we performed on the data collected and the lessons learned from the analysis, as well as from the process of obtaining (and losing) the botnet.
Bio:
Richard A. Kemmerer is the Computer Science Leadership Professor and a past Department Chair of the Department of Computer Science at the University of California, Santa Barbara. Dr. Kemmerer received the B.S. degree in Mathematics from the Pennsylvania State University in 1966, and the M.S. and Ph.D. degrees in Computer Science from the University of California, Los Angeles, in 1976 and 1979, respectively. His research interests include formal specification and verification of systems, computer system security and reliability, programming and specification language design, and software engineering.
Dr. Kemmerer is a Fellow of the IEEE Computer Society, a Fellow of the Association for Computing Machinery, and he is the 2007 recipient of The Applied Security Associates Distinguished Practitioner Award. He is a member of the IFIP Working Group 11.3 on Database Security, and a member of the International Association for Cryptologic Research. He is a past Editor-in-Chief of IEEE Transactions on Software Engineering, and he has served on the editorial boards of the ACM Computing Surveys and IEEE Security and Privacy and on the Board of Governors of the IEEE Computer Society. He served on Microsoft’s Trustworthy Computing Academic Advisory Board (2002-2010) and on the National Science Foundations/CISE Advisory Board (2002-2004).
Abstract:
Though in essence an engineering discipline, software engineering research has always been struggling to demonstrate impact. This is reflected in part by the funding challenges that the discipline faces in many countries, the difficulties we have to attract industrial participants to our conferences, and the scarcity of papers reporting industrial case studies.
There are clear historical reasons for this but we nevertheless need, as a community, to question our research paradigms and peer evaluation processes in order to improve the situation. From a personal standpoint, relevance and impact are concerns that I have been struggling with for a long time, which eventually led me to leave a comfortable academic position and a research chair to work in industry-driven research.
I will use some concrete research project examples to argue why we need more inductive research, that is, research working from specific observations in real settings to broader generalizations and theories. Among other things, the examples will show how a more thorough understanding of practice and closer interactions with practitioners can profoundly influence the definition of research problems, and the development and evaluation of solutions to these problems. Furthermore, these examples will illustrate why, to a large extent, useful research is necessarily multidisciplinary. I will also address issues regarding the implementation of such a research paradigm and show how our own bias as a research community worsens the situation and undermines our very own interests.
On a more humorous note, the title hints at the fact that being a scientist in software engineering and aiming at having impact on practice often entails leading two parallel careers and impersonate different roles to different peers and partners.
Bio:
Lionel Briand is heading the Certus center on software verification and validation at Simula Research Laboratory, where he is leading research projects with industrial partners. He is also a professor at the University of Oslo (Norway). Before that, he was on the faculty of the department of Systems and Computer Engineering, Carleton University, Ottawa, Canada, where he was full professor and held the Canada Research Chair (Tier I) in Software Quality Engineering. He is the coeditor-in-chief of Empirical Software Engineering (Springer) and is a member of the editorial boards of Systems and Software Modeling (Springer) and Software Testing, Verification, and Reliability (Wiley). He was on the board of IEEE Transactions on Software Engineering from 2000 to 2004. Lionel was elevated to the grade of IEEE Fellow for his work on the testing of object-oriented systems. His research interests include: model-driven development, testing and verification, search-based software engineering, and empirical software engineering.
Metrics - Using Source Code Metrics to Predict Change-Prone Java InterfacesICSM 2011
Paper title: Using Source Code Metrics to Predict Change-Prone Java Interfaces
Authors: Daniele Romano and Martin Pinzger
Session: Research Track Session 11: Metrics
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...ICSM 2011
Paper: Structural Conformance Checking with Design Tests: An Evaluation of Usability and Scalability.
Authors: João Brunet, Dalton Dario Serey Guerrero and Jorge Figueiredo.
Session: Research Track 5: Traceability
ERA - Clustering and Recommending Collections of Code Relevant to TaskICSM 2011
Paper: Clustering and Recommending Collections of Code Relevant to Task
Authors: Seonah Lee and Sungwon Kang
Session: Early Research Achievements Track Session 3: Managing and Supporting Software Maintenance Activities
Postdoc symposium - A Logic Meta-Programming Foundation for Example-Driven Pa...ICSM 2011
Paper: A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in Object-Oriented Programs
Author: Coen De Roover
Session: Post-doctoral symposium
Components - Graph Based Detection of Library API LimitationsICSM 2011
Paper: Graph-based Detection of Library API Imitations
Authors: Chengnian Sun, Siau-Cheng Khoo, Shao Jie Zhang (All from National University of Singapore)
Session: Research Track Session 7: Component
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...ICSM 2011
Paper: Localizing Failure-Inducing Program Edits Based on Spectrum Information.
Authors: Lingming Zhang, Miryung Kim, Sarfraz Khurshid.
Session: Research Track Session 1: Faults and Regression Testing
Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...ICSM 2011
Paper: Expanding Identifiers to Normalize Source Code Vocabulary
Authors: Dave Binkley and Dawn Lawrie
Session: Research Track 4: Natural Language Analysis
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
ERA - A Comparison of Stemmers on Source Code Identifiers for Software SearchICSM 2011
Paper: A Comparison of Stemmers on Source Code Identifiers for Software
Search
Authors: Andrew Wiese, Valerie Ho, Emily Hill.
Session: ERA1 - Linguistic Analysis of Software Artifacts
Industry - Testing & Quality Assurance in Data Migration Projects ICSM 2011
Paper: Testing & Quality Assurance in Data Migration Projects
Authors: Klaus Haller, Florian Matthes, Christopher Schulz
Session: Industry Track Session 3: Evolution and migration
Natural Language Analysis - Mining Java Class Naming ConventionsICSM 2011
Paper: Mining Java Class Naming Conventions
Authors: Simon Butler, Michel Wermelinger, Yijun Yu and Helen Sharp
Session: Research Track 4 - Natural Language Analysis
Industry - Evolution and migration - Incremental and Iterative Reengineering ...ICSM 2011
Paper: Incremental and Iterative Reengineering towards Software Product Line: An Industrial Case Study
Authors: Gang Zhang, Liwei Shen, Xin Peng, Zhenchang Xing and Wenyun Zhao
Session: Industry Track Session 3: Evolution and migration
Industry - Estimating software maintenance effort from use cases an indu...ICSM 2011
Paper: Estimating Software Maintenance Effort from Use Cases: an Industrial Case Study
Authors:Yan Ku, Jing Du, Ye Yang, Qing Wang
Session: Industry Tracking 5: Metrics and
Estimation
Industry - The Evolution of Information Systems. A Case Study on Document Man...ICSM 2011
Paper : The Evolution of Information Systems. A Case Study on Document Management
Authors : Paolo Salvaneschi
Session: Industry Track Session 3: Evolution and migration
Components - Crossing the Boundaries while Analyzing Heterogeneous Component-...ICSM 2011
Paper: "Crossing the Boundaries while Analyzing Heterogeneous Component-Based Software Systems"
Authors: Amir Reza Yazdanshenas, Leon Moonen
Session: Research Track Session 7: Components
Abstract:
Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, which is a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims. In this talk, I will report on our efforts to take control of the Torpig botnet for ten days. Over this period, we observed more than 180 thousand infections and recorded more than 70 GB of data that the bots collected.
While botnets have been hijacked before, the Torpig botnet exhibits certain properties that make the analysis of the data particularly interesting. First, it is possible (with reasonable accuracy) to identify unique bot infections and relate that number to the more than 1.2 million IP addresses that contacted our command and control server during the ten day period. This shows that botnet estimates that are based on IP addresses are likely to report inflated numbers. Second, the Torpig botnet is large, targets a variety of applications, and gathers a rich and diverse set of information from the infected victims. This allowed us to perform interesting data analysis that goes well beyond simply counting the number of stolen credit cards. In this talk I will discuss the analysis that we performed on the data collected and the lessons learned from the analysis, as well as from the process of obtaining (and losing) the botnet.
Bio:
Richard A. Kemmerer is the Computer Science Leadership Professor and a past Department Chair of the Department of Computer Science at the University of California, Santa Barbara. Dr. Kemmerer received the B.S. degree in Mathematics from the Pennsylvania State University in 1966, and the M.S. and Ph.D. degrees in Computer Science from the University of California, Los Angeles, in 1976 and 1979, respectively. His research interests include formal specification and verification of systems, computer system security and reliability, programming and specification language design, and software engineering.
Dr. Kemmerer is a Fellow of the IEEE Computer Society, a Fellow of the Association for Computing Machinery, and he is the 2007 recipient of The Applied Security Associates Distinguished Practitioner Award. He is a member of the IFIP Working Group 11.3 on Database Security, and a member of the International Association for Cryptologic Research. He is a past Editor-in-Chief of IEEE Transactions on Software Engineering, and he has served on the editorial boards of the ACM Computing Surveys and IEEE Security and Privacy and on the Board of Governors of the IEEE Computer Society. He served on Microsoft’s Trustworthy Computing Academic Advisory Board (2002-2010) and on the National Science Foundations/CISE Advisory Board (2002-2004).
Abstract:
Though in essence an engineering discipline, software engineering research has always been struggling to demonstrate impact. This is reflected in part by the funding challenges that the discipline faces in many countries, the difficulties we have to attract industrial participants to our conferences, and the scarcity of papers reporting industrial case studies.
There are clear historical reasons for this but we nevertheless need, as a community, to question our research paradigms and peer evaluation processes in order to improve the situation. From a personal standpoint, relevance and impact are concerns that I have been struggling with for a long time, which eventually led me to leave a comfortable academic position and a research chair to work in industry-driven research.
I will use some concrete research project examples to argue why we need more inductive research, that is, research working from specific observations in real settings to broader generalizations and theories. Among other things, the examples will show how a more thorough understanding of practice and closer interactions with practitioners can profoundly influence the definition of research problems, and the development and evaluation of solutions to these problems. Furthermore, these examples will illustrate why, to a large extent, useful research is necessarily multidisciplinary. I will also address issues regarding the implementation of such a research paradigm and show how our own bias as a research community worsens the situation and undermines our very own interests.
On a more humorous note, the title hints at the fact that being a scientist in software engineering and aiming at having impact on practice often entails leading two parallel careers and impersonate different roles to different peers and partners.
Bio:
Lionel Briand is heading the Certus center on software verification and validation at Simula Research Laboratory, where he is leading research projects with industrial partners. He is also a professor at the University of Oslo (Norway). Before that, he was on the faculty of the department of Systems and Computer Engineering, Carleton University, Ottawa, Canada, where he was full professor and held the Canada Research Chair (Tier I) in Software Quality Engineering. He is the coeditor-in-chief of Empirical Software Engineering (Springer) and is a member of the editorial boards of Systems and Software Modeling (Springer) and Software Testing, Verification, and Reliability (Wiley). He was on the board of IEEE Transactions on Software Engineering from 2000 to 2004. Lionel was elevated to the grade of IEEE Fellow for his work on the testing of object-oriented systems. His research interests include: model-driven development, testing and verification, search-based software engineering, and empirical software engineering.
Metrics - Using Source Code Metrics to Predict Change-Prone Java InterfacesICSM 2011
Paper title: Using Source Code Metrics to Predict Change-Prone Java Interfaces
Authors: Daniele Romano and Martin Pinzger
Session: Research Track Session 11: Metrics
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...ICSM 2011
Paper: Structural Conformance Checking with Design Tests: An Evaluation of Usability and Scalability.
Authors: João Brunet, Dalton Dario Serey Guerrero and Jorge Figueiredo.
Session: Research Track 5: Traceability
ERA - Clustering and Recommending Collections of Code Relevant to TaskICSM 2011
Paper: Clustering and Recommending Collections of Code Relevant to Task
Authors: Seonah Lee and Sungwon Kang
Session: Early Research Achievements Track Session 3: Managing and Supporting Software Maintenance Activities
Postdoc symposium - A Logic Meta-Programming Foundation for Example-Driven Pa...ICSM 2011
Paper: A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in Object-Oriented Programs
Author: Coen De Roover
Session: Post-doctoral symposium
Components - Graph Based Detection of Library API LimitationsICSM 2011
Paper: Graph-based Detection of Library API Imitations
Authors: Chengnian Sun, Siau-Cheng Khoo, Shao Jie Zhang (All from National University of Singapore)
Session: Research Track Session 7: Component
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...ICSM 2011
Paper: Localizing Failure-Inducing Program Edits Based on Spectrum Information.
Authors: Lingming Zhang, Miryung Kim, Sarfraz Khurshid.
Session: Research Track Session 1: Faults and Regression Testing
Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...ICSM 2011
Paper: Expanding Identifiers to Normalize Source Code Vocabulary
Authors: Dave Binkley and Dawn Lawrie
Session: Research Track 4: Natural Language Analysis
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Migration and Refactoring - Identifying Overly Strong Conditions in Refactoring Implementations
1. Identifying overly strong conditions
in refactoring implementations
Gustavo Soares
Melina Mongiovi
Rohit Gheyi
gsoares@dsc.ufcg.edu.br
Federal University of Campina Grande
terça-feira, 11 de outubro de 2011
2. Employee
...
Salesman Engineer
... ...
name name
Duplicated code
2
terça-feira, 11 de outubro de 2011
3. Pull Up Field Refactoring
Refactoring
Employee engines Employee
... ...
name
Salesman Engineer
... ... Salesman Engineer
name name ... ...
Precondition
The name field is not declared in class Employee
3
terça-feira, 11 de outubro de 2011
4. It’s difficult to specify and
implement preconditions
preconditions
4
terça-feira, 11 de outubro de 2011
5. Problem
Overly
strong
condi0ons
prevent
safe
transforma+ons
Implemented
preconditions
Overly
weak
condi0ons
allow
unsafe
transforma+ons
5
terça-feira, 11 de outubro de 2011
6. Motivating example
A
JRRT
GetF() cannot access
B
variable f
Pull up field
private int f
int getF() : f
6
terça-feira, 11 de outubro de 2011
7. A Overly strong
JRRT
GetF() cannot access
B
variable f
Pull up field
private int f
int getF() : f
A A
protected int f
B B
Pull up field
private int f int getF() : f
int getF() : f
7
terça-feira, 11 de outubro de 2011
8. Identifying overly strong
conditions
An evaluation on 3 refactoring engines
JRRT
8
terça-feira, 11 de outubro de 2011
9. Testing
input
expected
output
9
terça-feira, 11 de outubro de 2011
10. Testing
input engine
expected
output
output
Overly strong
10
terça-feira, 11 de outubro de 2011
11. Exhaustively generating programs
input
Overly
Strong Differential testing
conditions
Overly Strong
Condition
11
terça-feira, 11 de outubro de 2011
12. 2 Class, 2 Method, 2 Field
One subclass declaring a field
12
terça-feira, 11 de outubro de 2011
13. 2 Class, 2 Method, 2 Field
One subclass declaring a field
Java Meta model Alloy Solutions Java programs
public class Class0 {
public int method2(){ { {
public class Class0
public class Class0
public int method2(){
return 10;
public int method2(){
} return 10;
return 10;
} }}
}
class Class1 extends Class0 {
}
class Class1 extends Class0 {
public int method1(){ Class0 {
class Class1 extends
public int method1(){
return 20; method1(){
public int
} return 20;
} return 20;
public int method2(){
}
public int method2(){
super.k(); method2(){
public int
} super.k();
super.k();
} }}
}
}
13
terça-feira, 11 de outubro de 2011
14. Exhaustively generating programs
input
expected
output Differential testing
Overly Strong
Condition
14
terça-feira, 11 de outubro de 2011
15. B.getF
A A
protected int f
B B
0/4 0/4
private int f int getF() : f
int getF() : f 4
No behavioral change was found
15
terça-feira, 11 de outubro de 2011
16. Classifying
overly strong
preconditions
Technique
Differential
testing
16
terça-feira, 11 de outubro de 2011
SPEC
18. Evaluation
18
terça-feira, 11 de outubro de 2011
19. Up to 10 refactorings
Refactoring Eclipse JRRT NetBeans
Rename Class X X X
Rename Method X X X
Rename Field X X X
Push Down Method X X X
Push Down Field X X X
Pull Up Method X X X
Pull Up Field X X X
Encapsulate Field X X
Move Method X X
Add Parameter X X
2 Packages, 3 classes, 4 methods, 2 fields
19
terça-feira, 11 de outubro de 2011
20. Results
Rejected Beh. Pres. Overly Strong Condition
Refactoring Program
Ecl JRRT NetB Ecl JRRT NetB
Rename Class 4660 446 0 0 2 0 0
Rename Method 4752 4802 419 0 4 1 0
Rename Field 3168 200 0 0 2 0 0
Push Down Method 9366 59 40 0 1 1 0
Push Down Field 4800 0 0 0 0 0 0
Pull Up Method 10322 251 398 0 2 2 0
Pull Up Field 4320 744 584 0 1 1 0
Encapsulate Field 900 176 1536 - 1 1 -
Move Method 3002 367 135 - 2 1 -
Add Parameter 4279 79 0 - 2 0 -
Total 42774 7124 3112 0 17 7 0
20
terça-feira, 11 de outubro de 2011
21. JRRT feedback
Refactoring Strong conditions
Rename Method overriding
has
changed
Push Down Method cannot
access
method
method
is
used
Pull Up Method
cannot
access
method
Pull Up Field cannot
access
variable
Encapsulate Field cannot
insert
method
here
Move Method cannot
inline
ambiguous
method
call
21
terça-feira, 11 de outubro de 2011
22. JRRT feedback
Refactoring Strong conditions Cause
Rename Method overriding
has
changed precondi+on
Push Down Method cannot
access
method incorrect
analysis
method
is
used incorrect
analysis
Pull Up Method
cannot
access
method incorrect
analysis
Pull Up Field cannot
access
variable
feature
not
implemented
Encapsulate Field cannot
insert
method
here feature
not
implemented
Move Method cannot
inline
ambiguous
method
call incorrect
analysis
22
terça-feira, 11 de outubro de 2011
23. Conclusions
Differential
Testing
+ Implemented
preconditions
overly strong conditions + overly weak conditions
23
terça-feira, 11 de outubro de 2011
24. Identifying overly strong conditions
in refactoring implementations
Gustavo Soares
Melina Mongiovi
Rohit Gheyi
gsoares@dsc.ufcg.edu.br
Federal University of Campina Grande
24
terça-feira, 11 de outubro de 2011