You would need to know that the system is similar in its control. Therefore, the controlling software should be analyzed. It's easy to argue that you could just find a twin for your critical system in an academic sense. But in the real world, you may not have access to the intellectual property or trade secrets of the controlling software without giving something up; payment for access, ownership or your product, etc. Even black box testing might require an expensive license to operate the proxy.
Could you identify a potential proxy without access to its source code? There may be over one billion Git repositories in the world today, between GitHub and other Git services. Could you determine software similarity based on Git metadata such as commit messages, commit counts, churn, and other data? GitLogger can help you identify similar software systems to as potential safe test proxies for critical system.
You would need to know that the system is similar in its control. Therefore, the controlling software should be analyzed. It's easy to argue that you could just find a twin for your critical system in an academic sense. But in the real world, you may not have access to the intellectual property or trade secrets of the controlling software without giving something up; payment for access, ownership or your product, etc. Even black box testing might require an expensive license to operate the proxy.
Could you identify a potential proxy without access to its source code? There may be over one billion Git repositories in the world today, between GitHub and other Git services. Could you determine software similarity based on Git metadata such as commit messages, commit counts, churn, and other data? GitLogger can help you identify similar software systems to as potential safe test proxies for critical system.