Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:05 PM
Dark Reading
Dark Reading
Products and Releases

More Than 90% of Developers Believe Unit Testing Is Most Effective For Reducing Bugs

Bugs are the responsibility of developers, according to 80 percent of Typemock survey takers

Tel-Aviv, April 4, 2012 – Typemock, (http://www.typemock.com/) the leading provider and pioneer of easy unit testing solutions, released today the results of their developer survey, finding that over 90 percent of developers agree that unit testing is an effective practice to reduce software bugs. Typemock surveyed developers from around the world to gather their opinion on the impact of software bugs. The global online survey showed that developers think that unit testing was more effective in reducing bugs than other practices, such as integration testing, pair programming, and QA. Only 50-70 percent of respondents find them to be effective in reducing bugs.

80 percent of respondents said that bugs are the responsibility of developers and only 8 percent said it was QA’s. More than 54 percent of respondents noted that they were responsible for bugs in their company’s software. An additional 26 percent of respondents felt that another developer was most responsible for software bugs.

Finding and fixing bugs takes up a significant portion of developers’ time, according to the survey. 48 percent of respondents said that they spend up to 5 hours each week finding and fixing bugs and 38 percent said they spend up to 10 hours a week on this alone, which is 25 percent of the average work week. An additional 12 percent spend over 10 hours of their week finding and fixing bugs. According to data received from customers using Typemock Team Mate, tracking developers’ actual usage, the amount of time developers spend using the debugger is even higher than they think – around 50-55 percent of their time.

Today, a company’s value is greatly affected when customers experience bugs in their software. Over 50 percent of respondents noted that, as developers, it is most damaging to their reputation when end users report a bug in the program.

As the survey shows, unit testing is more crucial than ever and with proper unit testing developers will be more efficient, catch more bugs, and create higher-quality code.

“As professional programmers, we know that unit testing is the best way to get rid of software bugs,” said Eli Lopian, CEO of Typemock. “Over 90 percent of developers see unit testing as the most effective way to find and fix bugs. We know that unit testing is difficult to start and the rewards are great. This is exactly the problem that Typemock is out to solve – helping beginners, novices, and experts to reach their unit testing/TDD goals. Automated unit testing with Typemock’s Isolator V7 ensures software bugs are caught instantly so they can be corrected immediately.”

About Typemock

The Isolator tool family enables easy unit testing - the lubricant of agile development - of any .NET or C/C++ code (including legacy code and unwritten code). Isolator V7 reduces bugs with the Autorunner and failed test analyzer. Isolator V7 also features visual code coverage, powerful mocking, high quality test assurance to guide you to write unit tests correctly, low maintenance test assurance, ensuring robust tests that don’t break, and integration with industry- leading tools.

Typemock was conceived in 2004 to help programmers become Agile through easy unit testing. Since the launch of the first version of Typemock Isolator in 2006, thousands of companies around the world use Typemock tools to make unit testing easy and to prevent bugs. Typemock users are developers from a wide range of sectors – such as defense, medical, and finance – that demand exceptionally high standards of quality and minimum bugs.

Typemock is a privately funded company based in Tel Aviv, Israel. See www.typemock.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-18
Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
PUBLISHED: 2021-05-18
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
PUBLISHED: 2021-05-18
In Pluck-4.7.10-dev2 admin background, a remote command execution vulnerability exists when uploading files.
PUBLISHED: 2021-05-18
A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.
PUBLISHED: 2021-05-18
An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage