Databene Benerator 0.8.1 freeware

It is a framework for generating realistic and valid high-volume test data for your system under test (avoiding the Datalite anti-pattern). benerator actually reduces the amount of time for creating a useful data setup of a medium sized enterprise application or XML Schema from 2-4 weeks to 1-2 days! ...

Author Volker Bergmann
Released 2013-03-13
Filesize 17.80 MB
Downloads 425
OS Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64
Installation Instal And Uninstall
Keywords Data Quality Assurance, Data Tester, Data Generation, Benerator, Framework, Tester
Users' rating
(28 rating)
Databene BeneratorOtherWindows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64
Databene Benerator - field Freeware Download Notice

Databene Benerator Free Download - we do not host any Databene Benerator torrent files or links of Databene Benerator on rapidshare.com, depositfiles.com, megaupload.com etc. All Databene Benerator download links are direct Databene Benerator download from publisher site or their selected mirrors.

Databene Benerator freeware - The Latest User Reviews
Databene Benerator freeware - The Latest Versions History
0.8.1 Mar 13, 2013 New Release enhancements:
· supporting jars and class files in project/lib folder
· descriptor
· Introduced generator scope

bug fixes:
· Benerator does not write log file
· Database Metadata cache is not used properly
· Source: README.TXT, updated 2012-04-11
0.7.7 Jul 5, 2012 New Release enhancements:
· supporting jars and class files in project/lib folder
· descriptor
· Introduced generator scope

bug fixes:
· Benerator does not write log file
· Database Metadata cache is not used properly
· Source: README.TXT, updated 2012-04-11
0.7.6 Apr 19, 2012 New Release enhancements:
· supporting jars and class files in project/lib folder
· descriptor
· Introduced generator scope

bug fixes:
· Benerator does not write log file
· Database Metadata cache is not used properly
· Source: README.TXT, updated 2012-04-11

Most popular Other freeware downloads

Kinect SDK

2.0.1410.19000 freeware download

... one or two people moving within the Kinect field of view make it easy to create gesture-driven applications. Advanced audio capabilities Audio processing capabilities ...

Quoter Amanuensis

5.5 freeware download

... >- "C:MyDirMyFile.txt" 3. Convert to a CSV field with commas and spaces in quotes, and quotes doubled. 4. Convert to Java char [] ...

Karrigell

3.1.1 freeware download

... environment needed in a web application : form field values, HTTP request headers, cookies, etc. The namespace also provides built-in functions to manage sessions, localization, ...

Arduino BOARDS.TXT Editor

1.60 freeware download

... programmers. The edit window offers documentation on every field of the board description. You can also copy BOARDS.TXT snippets from other people's web site and ...

J2EE Tools

0.46 freeware download

J2EE Tools is a lightweight IDE for creating, building, deploying and running J2EE enterprise applications and web services. J2EE Tools includes point and click access to ...

Jode

1.1.2 Pre1 freeware download

... the following operations: * Renaming class, method, field and local names to shorter, obfuscated, or unique ... Removing debugging information * Removing dead code (classes, fields, methods) and constant fields * Optimizing local variable ...

Pismo Trace Monitor SDK for Mac OS X

23U freeware download

... profiling. It can also be used in the field to gather diagnostic information. Features: Traces can be written from any executable, DLL, or driver. ...

Software Ideas Modeler Portable x64

14.55 freeware download

... and other diagram types, usually used in the field of software engineering. Since this is the portable version of the program, it is important to ...

Pismo Trace Monitor for Linux SDK

23U freeware download

... profiling. It can also be used in the field to gather diagnostic information. Features: Traces can be written from any executable, DLL, or driver. ...

SQLi

8 freeware download

... nefarious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).[1] SQL injection must exploit a ...