Abstract: An information processing device comprises one or more known hardware devices including a processor and memory. An intelligent test program is provided to drive the device to develop a smoke test for a target program the name, use and functionality of which is unknown to the test program. The intelligent test program can generate a report on the functionality of the target program and can capture call back functions associated with the target program in order to automatically develop a smoke test script file for use in subsequent smoke test runs on the device.
Abstract: An information processing device comprises one or more known hardware devices including a processor and memory. An intelligent test program is provided to drive the device to develop a smoke test for a target program the name, use and functionality of which is unknown to the test program. The intelligent test program can generate a report on the functionality of the target program and can capture call back functions associated with the target program in order to automatically develop a smoke test script file for use in subsequent smoke test runs on the device.
Abstract: A test server system provides a test server (5) situated behind an enterprise network firewall (4). The test server is arranged to capture an up to date image of all the information processing devices (1.1-3.3) integrated with the enterprise network. When a new (or updated) program module (NPM) is to be installed on the whole or any part of the enterprise network, the NPM installation is first run against an emulation of the enterprise network devices and any existing core program modules (CPM) (1.1?-3.3?) in the test server. A predetermined test protocol is tailored to the specific enterprise network and designed to ensure that installation of the NPM does not result in serious adverse effects on the effective operation of the emulated enterprise network for instance due to conflicts with other CPMs. In particular the tests applied to the emulated enterprise network can be applied to programs or configurations which are proprietary to the enterprise and often mission critical.