CN112817611B - Interception method and device for system test abnormal environment, computer equipment and storage medium - Google Patents

Interception method and device for system test abnormal environment, computer equipment and storage medium Download PDF

Info

Publication number
CN112817611B
CN112817611B CN202110134802.1A CN202110134802A CN112817611B CN 112817611 B CN112817611 B CN 112817611B CN 202110134802 A CN202110134802 A CN 202110134802A CN 112817611 B CN112817611 B CN 112817611B
Authority
CN
China
Prior art keywords
notebook
deployment
abnormal
interception
test
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110134802.1A
Other languages
Chinese (zh)
Other versions
CN112817611A (en
Inventor
霍开源
石骁
王伟良
蒋菲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Union Memory Information System Co Ltd
Original Assignee
Shenzhen Union Memory Information System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Union Memory Information System Co Ltd filed Critical Shenzhen Union Memory Information System Co Ltd
Priority to CN202110134802.1A priority Critical patent/CN112817611B/en
Publication of CN112817611A publication Critical patent/CN112817611A/en
Application granted granted Critical
Publication of CN112817611B publication Critical patent/CN112817611B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application relates to a method, a device, computer equipment and a storage medium for intercepting a system test abnormal environment, wherein the method comprises the following steps: acquiring an interception request of a system testing abnormal environment; starting a notebook from a network according to an interception request of the system testing abnormal environment and checking a registration state of the notebook; if the notebook is first deployed, directly deploying the system, registering the state of the notebook at a server after the notebook is successfully deployed, and marking the notebook as being tested; after the system is deployed, system testing is started, and when the notebook computer is abnormal in testing, the notebook computer is automatically restarted and started from the network; the deployment system reads the registration state before the notebook, and if the notebook is marked as being tested, deployment interception is performed to reserve the abnormal environment state before. The application realizes that when the notebook computer is restarted due to abnormal testing, the field environment of the abnormal testing is reserved.

Description

Interception method and device for system test abnormal environment, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and apparatus for intercepting a system test abnormal environment, a computer device, and a storage medium.
Background
With the development of computer technology, notebook computers have become the most powerful practical tool for people today, and the security and stability of notebook computers are necessary guarantees when people work with computers, so before the notebook computers leave the factory, the test machine system needs to be tested through a network installation system and corresponding drivers.
At present, in the conventional technology, under the environment of automatic deployment, if a lost starting partition occurs or a hard disk is lost in the process of a notebook computer system, the notebook computer can be automatically restarted, and the deployment system is restarted from a network by default. Under the condition that the system test is abnormal and unattended, the prior abnormal site can be destroyed, so that the reason of the abnormality generated during the system test cannot be analyzed exactly. Therefore, how to automatically reserve the environment where the system test is abnormal under the unattended condition is a problem to be solved.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, an apparatus, a computer device, and a storage medium for intercepting a system test abnormal environment.
A method of intercepting a system test anomaly environment, the method comprising:
acquiring an interception request of a system testing abnormal environment;
starting a notebook from a network according to an interception request of the system testing abnormal environment and checking a registration state of the notebook;
if the notebook is first deployed, directly deploying the system, registering the state of the notebook at a server after the notebook is successfully deployed, and marking the notebook as being tested;
after the system is deployed, system testing is started, and when the notebook computer is abnormal in testing, the notebook computer is automatically restarted and started from the network;
the deployment system reads the registration state before the notebook, and if the notebook is marked as being tested, deployment interception is performed to reserve the abnormal environment state before.
In one embodiment, after the step of starting the notebook from the network according to the interception request of the system test abnormal environment and checking the registration state of the notebook, the method further comprises:
and if the notebook computer does not need to be intercepted, the deployment of the system is directly carried out.
In one embodiment, the step of deploying interception to preserve the previous abnormal environmental state further comprises:
if the notebook is not marked as being tested, the system is directly deployed.
In one embodiment, after the step of deploying interception to preserve the previous abnormal environmental state if the notebook has been marked as under test, the step of, before the step of deploying system reading the registered state of the notebook, further comprises:
and after the exception handling is completed, clearing the registration state of the notebook computer stored at the server side.
An interception apparatus for a system testing abnormal environment, the apparatus comprising:
the acquisition module is used for acquiring an interception request of the system testing abnormal environment;
the checking module is used for starting the notebook from the network according to the interception request of the system to test the abnormal environment and checking the registration state of the notebook;
the state registration module is used for directly carrying out system deployment if the notebook is initially deployed, carrying out state registration on a server after the notebook is successfully deployed, and marking the notebook as in-test;
the restarting module is used for starting system testing after system deployment, and automatically restarting and starting from a network when the notebook computer is abnormal in testing;
and the deployment interception module is used for reading the registration state before the notebook by the deployment system, and if the notebook is marked as being tested, performing deployment interception to reserve the abnormal environment state before.
In one embodiment, the apparatus further comprises a direct deployment module for:
and if the notebook computer does not need to be intercepted, the deployment of the system is directly carried out.
In one embodiment, the direct deployment module is further configured to:
if the notebook is not marked as being tested, the system is directly deployed.
In one embodiment, the apparatus further comprises a status clearing module for:
and after the exception handling is completed, clearing the registration state of the notebook computer stored at the server side.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any one of the methods described above when the computer program is executed.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of any of the methods described above.
The interception method, the interception device, the computer equipment and the storage medium of the system test abnormal environment acquire an interception request of the system test abnormal environment; starting a notebook from a network according to an interception request of the system testing abnormal environment and checking a registration state of the notebook; if the notebook is first deployed, directly deploying the system, registering the state of the notebook at a server after the notebook is successfully deployed, and marking the notebook as being tested; after the system is deployed, system testing is started, and when the notebook computer is abnormal in testing, the notebook computer is automatically restarted and started from the network; the deployment system reads the registration state before the notebook, and if the notebook is marked as being tested, deployment interception is performed to reserve the abnormal environment state before. According to the application, when the notebook computer is restarted due to the occurrence of the test abnormality, the field environment of the test abnormality is reserved, so that the analysis and the processing of the reasons of the occurrence of the system deployment abnormality are facilitated, all the system deployment can be automatically completed under the unattended condition, and the reliability and the deployment efficiency of the system deployment are effectively improved.
Drawings
FIG. 1 is an application environment diagram of a method for intercepting a system test exception environment in one embodiment;
FIG. 2 is a flow diagram of a method for intercepting a system test exception environment in one embodiment;
FIG. 3 is a flowchart of a method for intercepting a system test exception environment in another embodiment;
FIG. 4 is a block diagram of an interception device of a system testing abnormal environment in one embodiment;
FIG. 5 is a block diagram of an interception device of a system testing abnormal environment in another embodiment;
FIG. 6 is a block diagram of an interception device of a system testing abnormal environment in another embodiment;
fig. 7 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
At present, in the conventional technology, under the environment of automatic deployment, if a lost starting partition occurs or a hard disk is lost in the process of a notebook computer system, the notebook computer can be automatically restarted, and the deployment system is restarted from a network by default. Under the condition that the system test is abnormal and unattended, the prior abnormal site can be destroyed, so that the reason of the abnormality generated during the system test cannot be analyzed exactly. Therefore, how to automatically reserve the environment where the system test is abnormal under the unattended condition is a problem to be solved.
Based on the above, the application provides a method for intercepting a system test abnormal environment, and the method can be applied to an application environment shown in fig. 1. Specifically, the application environment includes a deployment server 110 and a plurality of testers 120, and the deployment server 110 is connected to the plurality of testers 120 via a network, respectively. First, the tester 120 starts the notebook from the network. The handler 120 enters a winpe boot, boots the environment, deploys and registers the state if the system does not need to be intercepted. Then, after the system deployment of the machine under test 120 is completed, the system test is started, and the test is started from the network after abnormal automatic restart occurs. At this time, the deployment system reads the previous registration state and performs deployment interception.
In one embodiment, as shown in fig. 2, there is provided a system test anomaly environment interception method, which includes:
step 202, acquiring an interception request of a system testing abnormal environment;
step 204, starting the notebook from the network according to the interception request of the system test abnormal environment and checking the registration state of the notebook;
step 206, if the notebook is initially deployed, directly deploying the system, registering the state of the notebook at the server after the notebook is successfully deployed, and marking the notebook as being tested;
step 208, after the system is deployed, starting to perform system testing, and automatically restarting and starting from the network when the notebook computer is abnormal in testing;
in step 210, the deployment system reads the registration state before the notebook, and if the notebook has been marked as under test, then deployment interception is performed to preserve the previous abnormal environmental state.
In this embodiment, a method for intercepting a system test abnormal environment is provided, and the method can be applied to an application environment as shown in fig. 1. In the scheme, when the notebook computer system test is abnormal, system start interception can be performed after network start, abnormal sites in the previous system test are reserved to realize abnormal condition investigation, and the same abnormal condition is avoided in the next system test execution, and the specific implementation process is as follows:
firstly, acquiring an interception request of a system testing abnormal environment; starting the notebook from the network according to the interception request of the system test abnormal environment and checking the registration state of the notebook.
If the notebook is initially deployed, the deployment of the system is directly performed, after the deployment of the notebook is successful, the state registration is performed at the server side, and the notebook is marked as being tested. In one embodiment, after the step of starting the notebook from the network according to the interception request of the system test abnormal environment and checking the registration state of the notebook, further comprising: if the notebook does not need to be intercepted, the deployment of the system is directly carried out.
Then, after the system is deployed, system testing is started, and when the notebook computer is abnormal in testing, the notebook computer is automatically restarted and started from the network. At this time, the deployment system reads the registration state before the notebook, and if the notebook has been marked as under test, deployment interception is performed to preserve the previous abnormal environmental state. And finally, the reason of the abnormality of the notebook can be checked according to the abnormality environment reserved before, and after the abnormality is solved, the notebook can be restarted to perform subsequent other project tests again.
In one embodiment, the step of deploying the intercept to preserve the previous abnormal environmental state if the notebook has been marked as under test further comprises: if the notebook is not marked as being tested, the deployment of the system is directly performed.
In the above embodiment, the interception request of the abnormal environment is tested by the acquisition system; starting a notebook from a network according to an interception request of the system testing abnormal environment and checking a registration state of the notebook; if the notebook is first deployed, directly deploying the system, registering the state of the notebook at a server after the notebook is successfully deployed, and marking the notebook as being tested; after the system is deployed, system testing is started, and when the notebook computer is abnormal in testing, the notebook computer is automatically restarted and started from the network; the deployment system reads the registration state before the notebook, and if the notebook is marked as being tested, deployment interception is performed to reserve the abnormal environment state before. According to the scheme, when the notebook computer is restarted due to the occurrence of the test abnormality, the field environment of the test abnormality is reserved, so that the analysis and the processing of the reasons of the occurrence of the system deployment abnormality are facilitated, all the system deployment can be automatically completed under the unattended condition, and the reliability and the deployment efficiency of the system deployment are effectively improved.
In one embodiment, a method for intercepting a system test abnormal environment is provided, wherein the method further comprises, after the step of performing deployment interception to preserve the previous abnormal environment state if the notebook is marked as being tested, before the deployment system reads the registration state of the notebook:
and after the exception handling is completed, clearing the registration state of the notebook computer stored at the server side.
In this embodiment, an interception method for implementing a system test abnormal environment is provided, and reference may be made to execution logic shown in fig. 3, where a specific implementation process is as follows:
1. the notebook is started from the network.
2. And (3) guiding the system to a winpe (Windows Preinstallation Environment, windows pre-installation environment), performing guiding environment and checking state registration, if the system is deployed for the first time or a notebook which does not need to be intercepted is normally deployed, performing state registration at a server after the system is deployed successfully, and marking the corresponding state in the notebook as in-test.
3. After the system deployment is completed, system testing is started, and when an abnormality occurs in the testing, the notebook computer is automatically restarted and started from the network.
4. At this time, the deployment system reads the previous registration state, if the notebook is marked as under test, then deployment interception is performed, and the flow of automatic deployment is not performed to preserve the previous abnormal environment.
5. And (3) checking the reason of the abnormality of the notebook according to the abnormality environment reserved before, and clearing the marked state of the notebook in the server after the abnormality condition of the notebook is processed.
It should be understood that, although the steps in the flowcharts of fig. 1-3 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 1-3 may include multiple sub-steps or phases that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the sub-steps or phases are performed necessarily occur sequentially, but may be performed alternately or alternately with at least a portion of the sub-steps or phases of other steps or other steps.
In one embodiment, as shown in fig. 4, there is provided an interception apparatus 400 for a system test abnormal environment, the apparatus comprising:
an acquiring module 401, configured to acquire an interception request of a system test abnormal environment;
a checking module 402, configured to start a notebook from a network according to an interception request of the system to test an abnormal environment and check a registration state of the notebook;
the state registration module 403 is configured to directly perform system deployment if the notebook is first deployment, perform state registration at a server after the notebook is successfully deployed, and mark the notebook as in-test;
a restarting module 404, configured to start a system test after system deployment, and automatically restart and start from a network when an abnormality occurs in the notebook computer in the test;
the deployment interception module 405 is configured to perform deployment interception to preserve a previous abnormal environmental state if the notebook is marked as being tested by reading a registration state before the notebook by the deployment system.
In one embodiment, as shown in fig. 5, there is provided an interception apparatus 400 for system testing abnormal environments, the apparatus further comprising a direct deployment module 406 for:
and if the notebook computer does not need to be intercepted, the deployment of the system is directly carried out.
In one embodiment, the direct deployment module 406 is further configured to:
if the notebook is not marked as being tested, the system is directly deployed.
In one embodiment, as shown in fig. 6, there is provided an interception device 400 for a system test abnormal environment, the device further comprising a status clearing module 407 for:
and after the exception handling is completed, clearing the registration state of the notebook computer stored at the server side.
For specific limitation of the interception device for the system test abnormal environment, reference may be made to the limitation of the interception method for the system test abnormal environment hereinabove, and the description thereof will not be repeated.
In one embodiment, a computer device is provided, the internal structure of which may be as shown in FIG. 7. The computer device includes a processor, a memory, and a network interface connected by a device bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The nonvolatile storage medium stores an operating device, a computer program, and a database. The internal memory provides an environment for the operation of the operating device and the computer program in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a method of intercepting a system test exception environment.
It will be appreciated by those skilled in the art that the structure shown in FIG. 7 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided that includes a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps in the method embodiments above when executing the computer program.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, carries out the steps of the above method embodiments.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.

Claims (10)

1. A method for intercepting a system test abnormal environment, the method comprising:
acquiring an interception request of a system testing abnormal environment;
starting a notebook from a network according to an interception request of the system testing abnormal environment and checking a registration state of the notebook;
if the notebook is first deployed, directly deploying the system, registering the state of the notebook at a server after the notebook is successfully deployed, and marking the notebook as being tested;
after the system is deployed, system testing is started, and when the notebook computer is abnormal in testing, the notebook computer is automatically restarted and started from the network;
the deployment system reads the registration state before the notebook, and if the notebook is marked as being tested, deployment interception is performed to reserve the abnormal environment state before.
2. The interception method of a system test abnormal environment according to claim 1, further comprising, after the step of starting a notebook from a network according to the interception request of the system test abnormal environment and checking a registration state of the notebook:
and if the notebook computer does not need to be intercepted, the deployment of the system is directly carried out.
3. The method of claim 2, wherein the step of deploying interception to preserve the previous abnormal environment state if the notebook is marked as under test further comprises the steps of:
if the notebook is not marked as being tested, the system is directly deployed.
4. A method of intercepting a system test abnormal environment according to any of claims 1-3, wherein, after the step of deploying and intercepting to preserve the previous abnormal environment state if the notebook has been marked in the test, before the step of deploying and system reads the registration state of the notebook, further comprises:
and after the exception handling is completed, clearing the registration state of the notebook computer stored at the server side.
5. An interception device for a system test abnormal environment, the device comprising:
the acquisition module is used for acquiring an interception request of the system testing abnormal environment;
the checking module is used for starting the notebook from the network according to the interception request of the system to test the abnormal environment and checking the registration state of the notebook;
the state registration module is used for directly carrying out system deployment if the notebook is initially deployed, carrying out state registration on a server after the notebook is successfully deployed, and marking the notebook as in-test;
the restarting module is used for starting system testing after system deployment, and automatically restarting and starting from a network when the notebook computer is abnormal in testing;
and the deployment interception module is used for reading the registration state before the notebook by the deployment system, and if the notebook is marked as being tested, performing deployment interception to reserve the abnormal environment state before.
6. The system test anomaly blocking device of claim 5, further comprising a direct deployment module configured to:
and if the notebook computer does not need to be intercepted, the deployment of the system is directly carried out.
7. The system test anomaly blocking device of claim 6, wherein the direct deployment module is further configured to:
if the notebook is not marked as being tested, the system is directly deployed.
8. The system test anomaly detection intercept device of any one of claims 5-7, further comprising a status flush module configured to:
and after the exception handling is completed, clearing the registration state of the notebook computer stored at the server side.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any one of claims 1 to 4 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 4.
CN202110134802.1A 2021-01-29 2021-01-29 Interception method and device for system test abnormal environment, computer equipment and storage medium Active CN112817611B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110134802.1A CN112817611B (en) 2021-01-29 2021-01-29 Interception method and device for system test abnormal environment, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110134802.1A CN112817611B (en) 2021-01-29 2021-01-29 Interception method and device for system test abnormal environment, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112817611A CN112817611A (en) 2021-05-18
CN112817611B true CN112817611B (en) 2023-08-29

Family

ID=75860849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110134802.1A Active CN112817611B (en) 2021-01-29 2021-01-29 Interception method and device for system test abnormal environment, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112817611B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929662A (en) * 2012-10-12 2013-02-13 浪潮电子信息产业股份有限公司 Network-based method for partitioning in batch
CN109302522A (en) * 2018-09-11 2019-02-01 北京京东金融科技控股有限公司 Test method, device and computer system and medium
CN109783117A (en) * 2019-01-18 2019-05-21 中国人民解放军国防科技大学 Mirror image file making and starting method of diskless system
CN110290114A (en) * 2019-06-04 2019-09-27 武汉大学 A kind of loophole automation means of defence and system based on warning information
CN111597064A (en) * 2020-05-22 2020-08-28 苏州浪潮智能科技有限公司 Server reliability testing method and device
CN111985010A (en) * 2020-08-20 2020-11-24 深圳忆联信息系统有限公司 Interception verification method and device for notebook hard disk, computer equipment and storage medium
CN112099918A (en) * 2019-09-13 2020-12-18 谷歌有限责任公司 Live migration of clusters in containerized environments

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10044795B2 (en) * 2014-07-11 2018-08-07 Vmware Inc. Methods and apparatus for rack deployments for virtual computing environments
US9632886B2 (en) * 2015-02-26 2017-04-25 Jpmorgan Chase Bank, N.A. Systems and methods for implementing an automated parallel deployment solution

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929662A (en) * 2012-10-12 2013-02-13 浪潮电子信息产业股份有限公司 Network-based method for partitioning in batch
CN109302522A (en) * 2018-09-11 2019-02-01 北京京东金融科技控股有限公司 Test method, device and computer system and medium
CN109783117A (en) * 2019-01-18 2019-05-21 中国人民解放军国防科技大学 Mirror image file making and starting method of diskless system
CN110290114A (en) * 2019-06-04 2019-09-27 武汉大学 A kind of loophole automation means of defence and system based on warning information
CN112099918A (en) * 2019-09-13 2020-12-18 谷歌有限责任公司 Live migration of clusters in containerized environments
CN111597064A (en) * 2020-05-22 2020-08-28 苏州浪潮智能科技有限公司 Server reliability testing method and device
CN111985010A (en) * 2020-08-20 2020-11-24 深圳忆联信息系统有限公司 Interception verification method and device for notebook hard disk, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Malicious Codes Detection Based on Ensemble Learning;Shulin Wang 等;《International Conference on Autonomic and Trusted Computing》;468-477 *

Also Published As

Publication number Publication date
CN112817611A (en) 2021-05-18

Similar Documents

Publication Publication Date Title
CN108427613B (en) Abnormal interface positioning method and device, computer equipment and storage medium
CN108400978B (en) Vulnerability detection method and device, computer equipment and storage medium
CN109408261B (en) Application program crash processing method and device, computer equipment and storage medium
CN110618819B (en) Method, device and computer equipment for automatic batch deployment of WINPE (WINPE) system
CN112395202B (en) Interface automation test method and device, computer equipment and storage medium
CN111258591A (en) Program deployment task execution method and device, computer equipment and storage medium
CN112115005B (en) Test data acquisition method and device, computer equipment and storage medium
CN113162945A (en) Vulnerability detection analysis method and device and vulnerability verification method and system based on vulnerability detection analysis method and device
CN114328243A (en) Abnormal operation data processing method, device, equipment and storage medium
CN112817611B (en) Interception method and device for system test abnormal environment, computer equipment and storage medium
CN111930579A (en) Test machine deployment permission verification method and device, computer equipment and storage medium
CN110826114B (en) User data testing method and device based on SSD after safe erasure
CN113851183A (en) Solid state disk testing method and device based on UEFI environment and computer equipment
CN113760623A (en) Method and device for testing TCG (trusted computing group) protocol function of solid state disk and computer equipment
CN111985010A (en) Interception verification method and device for notebook hard disk, computer equipment and storage medium
CN112540916A (en) Automatic rerun method and device for failed case, computer equipment and storage medium
CN113377613B (en) Hard disk test monitoring method and device based on Windows system and computer equipment
CN113535450A (en) Abnormity analysis method and device based on solid state disk test and computer equipment
CN110716854A (en) Code performance testing method and device, computer equipment and storage medium
CN113094276A (en) Batch testing method and device based on Linux system and computer equipment
CN113377588A (en) Sustainable integration test method and device for hard disk and computer equipment
CN112560035B (en) Application detection method, device, equipment and storage medium
CN113377599A (en) Low-power-consumption hard disk test method and device for Windows system and computer equipment
CN114201349A (en) Server hardware state detection method and device, computer equipment and storage medium
CN115963991A (en) Implementation method and device for improving efficiency of UFS background operation processing mechanism verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant