In software engineering, service virtualization is a method to emulate the behavior of specific components in heterogeneous component-based applications such as API-driven applications, cloud-based applications and service-oriented architectures. It is used to provide software development and QA/testing teams access to dependent system components that are needed to exercise an application under test (AUT), but are unavailable or difficult-to-access for development and testing purposes. With the behavior of the dependent components “virtualized”, testing and development can proceed without accessing the actual live components. Service virtualization is recognized by vendors, industry analysts, and industry publications as being different than mocking.
A method stub or simply stub in software development is a piece of code used to stand in for some other programming functionality. A stub may simulate the behavior of existing code (such as a procedure on a remote machine, such methods are often called mocks) or be a temporary substitute for yet-to-be-developed code.
In object-oriented programming, mock objects are simulated objects that mimic the behavior of real objects in controlled ways. A programmer typically creates a mock object to test the behavior of some other object, in much the same way that a car designer uses a crash test dummy to simulate the dynamic behavior of a human in vehicle impacts.
Time Travel Testing or Time Machine Testing
Going backward or forward in time to test application.
In computing, data deduplication is a specialized data compression technique for eliminating duplicate copies of repeating data.
When we want to move data from Prod to any other Dev/Test Environments, we need to remove customer sensitive information. This data deduplication process helps to identify and scamble such sensitive data.
In telecommunications, a scrambler is a device that transposes or inverts signals or otherwise encodes a message at the sender’s side to make the message unintelligible at a receiver not equipped with an appropriately set descrambling device.
We encrypt data before sending it.
The receiver needs to have appropriate keys to decrypt data
Testing with Rational Integration Tester