Subscribe: Untitled
http://www.freepatentsonline.com/rssfeed/rssapp717.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
application  based  code  computing  data  device  environment  function  includes  information  method  program  software  system 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Untitled

Untitled





 



TEST SUITE MINIMIZATION

Thu, 03 Nov 2016 08:00:00 EDT

Disclosed is a method and system for classifying test cases. In one implementation, the method comprises creating a test step master list comprising a plurality of test case, one more test step associated with the plurality of test case, and a test step identification number associated with the one more test step. Further, the method comprises generating a sequence diagram for each of the plurality of test cases based on the test step master list. Furthermore, the method comprises classifying, by the processor, each of the plurality of test cases in to an independent test case or an asynchronous test case or a synchronous test case based on the sequence diagram.



UNIFIED PROCESSING TEST STRUCTURE

Thu, 03 Nov 2016 08:00:00 EDT

A method, comprises receiving a test case on a processor, receiving an input from a user to call the test case in a first calling environment, identifying the first calling environment, setting a first indicator in a memory indicating the first calling environment, running a directive in the test case, wherein the directive calls a subroutine associated with the directive, and running the subroutine called by the directive wherein the subroutine includes receiving the first indicator indicating the first calling environment, performing a first task associated with the directive wherein the first task is performed in the first calling environment responsive to receiving the first indicator indicating the first calling environment, and outputting a result of the first task to a user on a display.



Developer Channel Compliance

Thu, 03 Nov 2016 08:00:00 EDT

Novel tools and techniques might provide for implementing application programming interface (“API”) use compliance, and, in some cases, by implementing application auditing for API use compliance within virtual environments in which target APIs are executed. In some embodiments, a method might comprise identifying misuse of an application programming interface (“API”) that is used in a developer channel, by intercepting data streams between the API and one or more computing systems, parsing the intercepted data streams, and determining whether the API is use non-compliant, based at least in part on identifying use non-compliant characteristics in the parsed data streams.



COMPOSABLE TEST AUTOMATION FRAMEWORK

Thu, 03 Nov 2016 08:00:00 EDT

A method for composable test automation includes executing a story by, for each step in a story, receiving a call for the step in the story, categorizing the step to identify a portion of a web application executable being tested by the step, selecting an application testing interface corresponding to the portion of the web application executable, converting the call to commands, transmitting the command to the application testing interface, receiving output from the application testing interface based on executing the commands, and transmitting the output. The method further includes generating a story report from executing the story, and storing the story report.



ANNOTATED TEST INTERFACES

Thu, 03 Nov 2016 08:00:00 EDT

In general, in one aspect, the technology relates to a method for composable testing. The method may include executing a story by, for at least one step in the story: identifying, from a plurality of generic compiled code interfaces, a code interface matching the step, identifying a user interface (UI) widget referenced in the step, issuing a call to testing script code, the call having a parameter of the UI widget, and executing the call using the testing script code. The method may further include generating a story report from executing the story, and storing the story report.



UNIFIED PROCESSING TEST STRUCTURE

Thu, 03 Nov 2016 08:00:00 EDT

A method, comprises receiving a test case on a processor, receiving an input from a user to call the test case in a first calling environment, identifying the first calling environment, setting a first indicator in a memory indicating the first calling environment, running a directive in the test case, wherein the directive calls a subroutine associated with the directive, and running the subroutine called by the directive wherein the subroutine includes receiving the first indicator indicating the first calling environment, performing a first task associated with the directive wherein the first task is performed in the first calling environment responsive to receiving the first indicator indicating the first calling environment, and outputting a result of the first task to a user on a display.



DEBUG MANAGEMENT USING A COUNTER

Thu, 03 Nov 2016 08:00:00 EDT

Disclosed aspects include identifying basic blocks of a program. For each basic block, the compiler inserts an identifier that includes the function name, and is coupled with a counter variable. In response to generating the identifier coupled with the counter variable, the program is compiled. During program execution, the counter value is incremented in response to a call of the basic block when executing the program. In response to incrementing the counter value, the counter value coupled with the identifier is displayed.



REAL-TIME USAGE CHECKING OF DYNAMICALLY GENERATED PROGRAM OUTPUT

Thu, 03 Nov 2016 08:00:00 EDT

Receive output dynamically generated by a running program and check that output for spelling, grammar, and/or other usage errors, providing notice to a user of any errors found. The dynamically generated output includes an assembly of component parts not statically assigned in a predetermined configuration or with predetermined content, but rather generated and/or configured by the executing program as it runs.



Integrating a Protocol Analysis Device with Features of a Software Development Program

Thu, 03 Nov 2016 08:00:00 EDT

In general, the subject matter described in this disclosure can be embodied in methods, systems, and program products for controlling a protocol analysis device when a code execution breakpoint is encountered. The method includes displaying computer code in a user interface of a software development program. The computer code includes a breakpoint. The computing system receives user input to cause a first hardware device to execute the computer code. The computing system instructs the first hardware device to execute the computer code. The computing system instructs a protocol analysis device that is in communication with the computing system to begin recording data that is transmitted between the first hardware device and a second hardware device. The computing system determines that execution of the computer code has reached the breakpoint and as a result instructs the protocol analysis device to start or stop recording the data.



DEBUG MANAGEMENT USING A COUNTER

Thu, 03 Nov 2016 08:00:00 EDT

Disclosed aspects include identifying basic blocks of a program. For each basic block, the compiler inserts an identifier that includes the function name, and is coupled with a counter variable. In response to generating the identifier coupled with the counter variable, the program is compiled. During program execution, the counter value is incremented in response to a call of the basic block when executing the program. In response to incrementing the counter value, the counter value coupled with the identifier is displayed.



SYSTEM AND METHOD FOR ADDRESSING MALFUNCTIONS IN A SOFTWARE APPLICATION

Thu, 03 Nov 2016 08:00:00 EDT

Systems and methods for resolving a bug identified in a software application without use of patch release or major release. A bug report is received from a target platform, wherein the bug report stores information associated with the bug identified in the software application. The software application is analyzed to identify a component associated with the bug. A set of rules and a set of actions pertaining to the component are generated, wherein the set of rules are configured to monitor parameters associated to the component, and wherein the set of actions are configured to resolve the bug identified in the component. A new binary snippet corresponding to the component is generated based on the set of rules and the set of actions. The new binary snippet is injected into the application binary code in order to resolve the bug in the software application.



BINARY PROGRAM INSTRUMENTATION AND DEBUGGING

Thu, 03 Nov 2016 08:00:00 EDT

Disclosed is a system and method for setting breakpoints (BPs) that cannot be detected by code being debugged, e.g., to trap transparently at any instruction. The disclosed system and method permits execution tracing and instrumentation of binaries, including malware. The system and method can be used to analyze benign software also, e.g., software obfuscated for anti-reverse-engineering. An invisible breakpoint (IBP) is not detectable by the “guest,” the program being debugged. Hardware virtualization is used to split the code and data views of the program's text segment(s).



EFFECTIVE FEATURE LOCATION IN LARGE LEGACY SYSTEMS

Thu, 03 Nov 2016 08:00:00 EDT

A fine-grained behavior model matching based method and system for effective feature location in large legacy systems. A feature behavior analyzer extracts internal behaviors of a feature under requesting based on NLP techniques or writing rules of the feature specification and generates a feature behavior model. A method uses multiple information sources associated with each method under analyzing to generate an expressive behavior signature for each method. The method integrates control flow information of each method and the signature information of its callees, and generates a CFG-based behavior model. A feature location identifier identifies and ranks the feature-related code locations based on a similarity between the feature behavior and the code behavior models. In one aspect, “use cases”, “source code repository” and “issue tracking system” are historical information of existing applications that are used to help understand each code unit of legacy systems applications, and recommend code units related with the given feature description.



Populating a Software Catalogue with Related Product Information

Thu, 03 Nov 2016 08:00:00 EDT

A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.



INFRASTRUCTURE FOR HOSTING AND PUBLISHING SOFTWARE PACKAGES

Thu, 03 Nov 2016 08:00:00 EDT

A system and method for hosting and publishing software packages is disclosed. An example method includes receiving and storing artifacts related to a software development kit and metadata describing a version of the software development kit. The received artifacts and metadata may be converted into a package for the software development kit. The package may then be staged and the package's dependencies may be checked to ensure that the package's dependencies exist and that there are no conflicts with another staged package. The currently staged packages may then be tested to determine if there are any incompatibilities among the staged packages and access control information may be used to provide the currently staged packages in a common format to the appropriate users.



METHOD, APPARATUS, AND SYSTEM FOR PROCESSING DESKTOP DATA OF MOBILE TERMINAL

Thu, 03 Nov 2016 08:00:00 EDT

Embodiments of the present disclosure disclose a method, an apparatus, and a system for processing desktop data of a mobile terminal. According to the solutions, desktop data of a first mobile terminal may be acquired. Then, a local folder is created for a terminal application according to a desktop layout file in the desktop data, and an identifier is set. A mapping relationship between identifiers of new and original folders is established. Then, an installation package of the terminal application is traversed to determine whether the terminal application is installed locally. If yes, a local folder to which the terminal application belongs is determined according to the mapping relationship, installation information of the terminal application is placed in the determined local folder, and an icon of the terminal application is displayed at a corresponding location on a local desktop according to location information of the terminal application; and if not, the icon of the terminal application is acquired, a Not Installed indication is added, and then, the icon added with the Not Installed indication is displayed at a corresponding location on the local desktop according to the location information of the terminal application, so as to achieve the objective of migrating desktop data between different mobile terminals.



COMMUNICATIONS NETWORK, COMPUTER ARCHITECTURE, COMPUTER-IMPLEMENTED METHOD AND COMPUTER PROGRAM PRODUCT FOR DEVELOPMENT AND MANAGEMENT OF FEMTOCELL-BASED APPLICATIONS

Thu, 03 Nov 2016 08:00:00 EDT

In one aspect, the present application is directed to a communications network, a computer architecture, a computer-implemented method, and a computer program product for development and management of femtocell-based applications. In one aspect, the communications network may comprise at least one femtocell; a mobile operator network; and a computer architecture integrated in the mobile operator network, wherein the computer architecture is operable to support development and lifecycle management of at least one femtocell-based application for the at least one femtocell.



Developer Exchange System

Thu, 03 Nov 2016 08:00:00 EDT

A developer exchange system includes a data store storing records. Each record includes a function module and metadata specifying a function performed by the function module. A function ontology interrelates a plurality of functions. A function management module allows a first developer to select a first function from the ontology. An integration module provides processor-executable instructions to the first developer for integration into a first application. The processor-executable instructions include sending a function module request that identifies the first function to the developer exchange system, and receiving and executing a function module. The function module provides display data for use in the first application. A delivery module receives a function module request, specifying an identifier of a desired function, from a user device. The delivery module selects a function module corresponding to the desired function from the data store and transmits the selected function module to the user device.



Method and Device for Making Differential Upgrade Package, and Method and Device for System Differential Upgrading

Thu, 03 Nov 2016 08:00:00 EDT

The embodiments of disclosure disclose a method for differential upgrading of a variable-partition system, which includes the following steps that: partition information is acquired from a differential upgrade package; data backup is performed to data of old partitions; partition re-division is performed on the old partitions to obtain new partitions according to the partition information, and the new partitions are formatted; the backed-up data is recovered into the new partitions; and differential upgrading is performed of the variable-partition system by virtue of the differential upgrade package. The embodiments of the disclosure also disclose a device for differential upgrading of the variable-partition system. The embodiments of the disclosure further disclose a method for making a differential upgrade package with partition information. The embodiments of the disclosure further disclose a device for making a differential upgrade package with partition information. By the embodiments of the disclosure, the problem in the related art that differential upgrading cannot be implemented when partition information of a target version and the partition information of an original version are varied is effectively solved.



APPARATUS AND METHOD FOR VALIDATING APPLICATION DEPLOYMENT TOPOLOGY IN CLOUD COMPUTING ENVIRONMENT

Thu, 03 Nov 2016 08:00:00 EDT

The present invention relates to an apparatus and a method for validating application deployment topology in a cloud environment. There is provided an apparatus for validating application deployment topology in a cloud environment comprising: a topology skeleton generator configured to generate, based on multiple VMs and script packages running on the VMs created by a user and required to deploy an application as well as running order of script packages and data dependency between script packages set by the user, a topology skeleton that comprises at least scripts of script packages of respective VMs and running order of the script packages; and a simulator configured to simulate a runtime environment in the cloud environment at the apparatus, thereby validating the running order and data dependency with respect to the topology skeleton, wherein the simulator is installed in the apparatus by using a simulator installation package retrieved from the cloud environment.



SYSTEM AND APPROACH TO MANAGE VERSIONING OF FIELD DEVICES IN A MULTI-SITE ENTERPRISE

Thu, 03 Nov 2016 08:00:00 EDT

An energy management and control system that may manage versioning firmware for devices. The system may be structured in a hierarchy of enterprise, site and field levels, with one or more computing platforms at the various levels. An enterprise supervisor may detect and obtain new version firmware for the devices at the field level. The new version firmware may be transferred from the supervisor to one or more site controllers. The one or more site controllers may transfer the new version firmware to eligible field devices. The devices may report to their respective site controllers a status of a transfer of the new version hardware. The site controllers may report to the supervisor the status of the transfer. Detection of new version firmware may be automatic. Transfer of the new version firmware to virtually all of the eligible devices may be automatic.



Computing Device Facilitating End User Access to Functionality of Applications Not Yet Installed

Thu, 03 Nov 2016 08:00:00 EDT

A mobile computing device includes a touchscreen display, a transceiver, a non-transitory memory that stores a first native application that is installed at the mobile computing device, and a computing processor. The computer processor executes computer readable instructions that cause the computing processor to execute the first native application that is installed at the mobile computing device. The computing processor formulates a query for application functions. The computing processor sends the query to a remote system via the first native application. The remote system stores information regarding application functions. The computing processor, in response to sending the query, receives a result that includes a portion of a functionality associated with a second native application. The computing processor provides access to the functionality without installing the second native application.



Providing Application Functionality for Uninstalled Applications

Thu, 03 Nov 2016 08:00:00 EDT

A method is performed at a mobile computing device including a non-transitory memory that stores a first native application that is installed at the mobile computing device and one or more processors. The method includes executing the first native application that is installed at the mobile computing device. The method includes formulating a query for application functions. The method includes sending the query to a remote system via the first native application, wherein the remote system stores information regarding application functions. The method includes, in response to sending the query, receiving a result that includes a portion of a functionality associated with a second native application. The method includes providing access to the functionality without installing the second native application



APPARATUS AND METHOD FOR CREATING MODIFICATION APPLICATION INFORMATION

Thu, 03 Nov 2016 08:00:00 EDT

An apparatus for creating modification application information includes a processor. The processor is configured to create, on basis of a modification history of software executed in a system, first information on first modifications presumed to be currently applied to the software. The modification history includes information on second modifications applied to the software and dissolution of the second modifications. The processor is configured to restore the software to a state before the first modifications are applied. The processor is configured to re-apply the first modifications to the restored software on basis of the first information. The processor is configured to determine whether the first information is valid on basis of information on a progress or results of the restoration of the software and the re-application of the first modifications.



ELECTRONIC APPARATUS

Thu, 03 Nov 2016 08:00:00 EDT

A processor 2 (a) downloads a update program used for update of a program 12; (b) copies a rewriting program 21 included in the program 12 into the non volatile memory 1 in accordance with the program 12; (c) after copying the rewriting program 21, changes a program started by a boot program 11 from the program 12 to the copied rewriting program, and reboots; (d) after the reboot, in accordance with the boot program 11, starts execution of the copied rewriting program; and (e) in accordance with the copied rewriting program, rewrites the program 12 in the non volatile memory 1 using the update program.



METHODS AND APPARATUS FOR UPGRADING A PLURALITY OF DATABASES

Thu, 03 Nov 2016 08:00:00 EDT

Methods and apparatus for upgrading a plurality of databases are disclosed. For example, a computer system may receive a first upgrade order associated with a first database. The system then receives a second upgrade order associated with a second database, wherein the first upgrade order is indicative of a first higher upgrade precedence than the second upgrade order. The system then receives a first priority associated with a third database. The system then receives a second priority associated with a fourth database wherein the first priority is indicative of a second higher upgrade precedence than the second priority. The system then upgrades the first database first in time based on the first upgrade order. The system then upgrades the second database second in time based on the second upgrade order. The system then upgrades the third database third in time based on the first priority. The system then upgrades the fourth database fourth in time based on the second priority.



MAPPING BETWEEN LOCAL AND REMOTE FOR SEAMLESS BUILD AND DESIGN TIME EXPERIENCE

Thu, 03 Nov 2016 08:00:00 EDT

Methods, systems, apparatuses, and computer program products are provided for enabling local builds to be substantially equivalent with remote builds. Build input information is mapped from a file system at a local computing device to a file system at a remote computing device. This enables a build to be performed at the remote computing device based on files/folders of the remote file system. Build output information is mapped from the file system of the remote computing device to the file system of the local computing device. This enables the build output information to be analyzed at the local computing device with respect to files/folders of the local file system. In further implementations, build information is mapped between first and second file systems that are both maintained at the local computing device, and between first and second file systems that are both maintained at the remote computing device



SYSTEMS AND METHODS FOR SHORT RANGE WIRELESS DATA TRANSFER

Thu, 03 Nov 2016 08:00:00 EDT

Systems and methods for application level authentication are provided for use with the low energy Bluetooth device and accessory. This includes receiving accessory credentials from a server, establishing a Bluetooth low energy connection with the accessory, authenticating with the accessory, and lastly transferring data to the accessory. The transferring of the data may be either a bulk transfer, or a data stream. The authenticating may be an application layer authentication between a device and the accessory using a shared secret key and using a hash function. Additional embodiments include methods for over-the-air firmware updates, and device control of a low energy Bluetooth accessory.



ENTITY ACTION SUGGESTION ON A MOBILE DEVICE

Thu, 03 Nov 2016 08:00:00 EDT

Systems and methods are provided for suggesting actions for entities discovered in content on a mobile device. An example method can include running a mobile device emulator with a deep-link for a mobile application, determining a main entity for the deep link, mapping the main entity to the deep link, storing the mapping of the main entity to the deep link in a memory, and providing the mapping to a mobile device, the mapping enabling a user of the mobile device to select the deep link when the main entity is displayed on a screen of the mobile device. Another example method can include identifying at least one entity in content generated by a mobile application, identifying an action mapped to the at least one entity, the action representing a deep link into a second mobile application, and providing a control to initiate the action for the entity.



RELEASE AND MANAGEMENT OF COMPOSITE APPLICATIONS ON PAAS

Thu, 03 Nov 2016 08:00:00 EDT

A solution descriptor comprises a set of component workload units, a workload unit describing a deployable application component with application binary, configuration parameters and dependency declarations. An environment descriptor specifies a set of target platforms and plugins in an execution environment. A deployer interprets the solution descriptor and the environment descriptor, and generates a list of tuples comprising compatible workload-plugin-platform combinations. The deployer determines an execution order for the list of tuples, and invokes the plugins in the list of tuples in the execution order, wherein each of the plugins executes a corresponding compatible workload on a corresponding compatible target platform specified in the list of tuples.



PROCESSOR EMULATION USING MULTIPLE TRANSLATIONS

Thu, 03 Nov 2016 08:00:00 EDT

Examples described herein emulate a processing architecture using multiple translations of the same source binary. A first translation binary includes compiler optimizations not present in a second translation binary. During runtime, a dispatcher directs control flow of a CPU when branch instructions are reached. Specifically, a dispatcher directs a CPU to execute instructions in the first translation binary, and accesses the second translation binary when an instruction is to a target that is not addressable in the first translation binary. The first and second translation binaries enable a target processing architecture to emulate a source processing architecture without just-in-time compilation or other runtime interpretation.



INFORMATION PROCESSING APPARATUS AND COMPILING METHOD

Thu, 03 Nov 2016 08:00:00 EDT

A memory stores code including a plurality of functions and a plurality of function calls each calling one of the plurality of functions. A processor calculates, for each of the plurality of functions, a plurality of index values including a first index value indicating an iteration status of a loop in the function and a second index value indicating the code size of the function. The processor calculates, for each of the plurality of function calls, an evaluation value based on the plurality of index values that are calculated for the function called by the function call. The processor selects one or more of the plurality of function calls, based on the evaluation value, and inlines the selected function calls.



Optimization of Meta-Template Instantiations

Thu, 03 Nov 2016 08:00:00 EDT

An illustrative embodiment provides a computer-implemented method for an alternate type system for optimizing the evaluation and use of meta-template instantiations. The computer-implemented method obtains a source code, instantiates an element of the source code to form an instantiated element and identifies a meta-template within the instantiated element to form an identified meta-template. The computer-implemented method creates an entry for the identified meta-template in a first data structure, wherein the entry comprises a set of mapped entries, creates an associated entry in a second data structure linked to the entry comprising the set of mapped entries, wherein the associated entry represents the set of mapped entries, and uses the associated entry of the second data structure in combination with the entry of the first data structure.



RUNTIME STATE BASED CODE RE-OPTIMIZATION

Thu, 03 Nov 2016 08:00:00 EDT

A method and an apparatus to execute a code compiled from a source code to access an untyped variable are described. An optimized access code may be compiled in the code with speculative optimization via a type prediction of runtime value of the untyped variable. Invalidity of the type prediction may be dynamically detected for future runtime values of the untyped variable. The code may be updated with an access code compiled for the access without the speculative optimization based on the invalidity detection. The updated code can be executed for the access to the untyped variable without executing the optimized access code.



COMPILER OPTIMIZATION OF COROUTINES

Thu, 03 Nov 2016 08:00:00 EDT

As a memory usage optimization, a compiler identifies coroutines whose activation frames can be allocated on a caller's stack instead of allocating the frame on the heap. For example, when the compiler determines that a coroutine C's life cannot extend beyond the life of the routine R that first calls the coroutine C, the compiler generates code to allocate the activation frame for C on the stack of R, instead of generating code to allocate C's frame from heap memory. In some cases, as another optimization, code for coroutine C is also inlined with code for the routine R that calls C. Coroutine activation frame content variations and layout variations are also described.



A PROCESS INTEGRATION METHOD AND SYSTEM

Thu, 03 Nov 2016 08:00:00 EDT

A method for integrating an algorithm coded in a programming language and compiled into algorithm software libraries, into a target information processing system that comprises a set of target system algorithms being associated with a process proxy, with algorithm variables and variable data-object types. The process integration method comprises: generating a Variable Linker File for capturing associations between variables of the algorithm and the data-object of the target information processing system; linking the software libraries associated with the algorithm with predefined process proxy libraries, which provides linked libraries; creating a process proxy on a server based on the linked libraries and variable linker file; and linking the Variable Linker File with the process proxy being configured to exchange data in the runtime environment of the target system environment using the Variable Linker File to translate between the data-objects in the target information processing system and the variables of the algorithm.



FUNCTIONAL USE-CASE GENERATION

Thu, 03 Nov 2016 08:00:00 EDT

Functional use-case generation may include determining whether a requirements context is available. In response to a determination that the requirements context is available, the requirements context may be determined as a task context and as a rule context for a requirements sentence of a requirements document. The task context and the rule context may be used to select a functional model from a plurality of functional models. A functional use-case that includes an entity that is to perform a task based on a rule may be generated. Further, in response to a determination that the requirements context is not available, a functional model may be selected from the plurality of functional models based on process context, where the functional model includes a process related to the process context, and the functional model that includes the process related to the process context may be used to generate the functional use-case.



METHOD, SYSTEM AND APPARATUS FOR VISUAL PROGRAMMING OF INTERACTION WORKFLOWS FOR OMNI-CHANNEL CUSTOMER CONTACT CENTERS WITH INTEGRATED CUSTOMER RELATIONSHIP MANAGEMENT

Thu, 03 Nov 2016 08:00:00 EDT

A method, apparatus and system for achieving visual programming of interaction workflows for customer contact centers which eliminates the need for skilled computer telephony interaction programmers to program the screen pops and workflows that are presented to live-agent customer service representatives in a contact center. Further, the disclosed method and apparatus enables integration of contact information from omni-channel systems, as well as customer relationship management (“CRM”) data, data collected from interactive voice response (“IVR”) systems, and data pulled from third-party databases, into the screen pops and workflows in a way that is agnostic as to the type or protocol of the PBX switch, the IVR system and the CRM system utilized by a particular call center, by facilitating a level of abstraction and data flow between and among these components.



Function-Based Dynamic Application Extension Framework

Thu, 03 Nov 2016 08:00:00 EDT

A method of developing a first application includes accessing a graphical user interface of a developer exchange system. The method includes, using the graphical user interface of the developer exchange system, selecting a first function from a plurality of functions in a function ontology. The method includes receiving, from the developer exchange system, processor-executable instructions for integration into the first application. The processor-executable instructions include (i) sending a function module request to the developer exchange system, (ii) receiving a function module provided by the developer exchange system, (iii) executing the provided function module, and (iv) presenting display data from the provided function module within the first application. The function module request identifies the first function. The method includes integrating the processor-executable instructions into the first application, including designating an area in which to display the display data to a user of the first application.



TECHNOLOGY MAPPING ONTO CODE FRAGMENTS

Thu, 03 Nov 2016 08:00:00 EDT

Technology mapping onto code fragments and related concepts are disclosed. Program descriptions are obtained in a high-level language. One or more intrinsic libraries containing modules are obtained. The modules correspond to sections of code intended for execution on the special purpose hardware. The high-level program description is analyzed to determine locations of one or more cuts within the program. The cuts represent portions of the high-level code that are eligible for replacement by one or more modules from intrinsic libraries. A matching process is used to find modules that are suitable replacements for the high level code. Once the replacements are made, additional verification and/or validation are performed by compiler checking and/or execution tests.



Method of Adding Client Server Automation to Computer languages for Cloud Computing

Thu, 03 Nov 2016 08:00:00 EDT

A method for creating a process of computer programming without mandatorily distinguishing client side programming and server side programming and without mandatorily distinguishing server technologies, a new client server computer programming paradigm is created, in which there is not a distinguish between client side programming and server side programming, client server programming is done in a same way local programming is done.



PERFORMANCE VERIFICATION DEVICE FOR VERIFYING PERFORMANCE OF PROGRAM, METHOD, AND RECORDING MEDIUM HAVING PROGRAM RECORDED THEREON FOR CAUSING COMPUTER TO PERFORM THE METHOD

Thu, 03 Nov 2016 08:00:00 EDT

When generating a source code executed by a multi-core processor in order to verify performance of a control system, a device generates the source code as an object of execution by the multi-core processor from a control model, performs cooperative simulation, and measures an execution time of a program in the multi-core processor in the cooperative simulation.



DYNAMICALLY MONITORING CODE EXECUTION ACTIVITY TO IDENTIFY AND MANAGE INACTIVE CODE

Thu, 03 Nov 2016 08:00:00 EDT

Systems for computer code development and maintenance. Embodiments select one or more sections of source code, then modify the sections of source code by adding marker code where the marker code is executed when respective marked source code is executed. The marked source code is deployed, and a logging facility receives log messages responsive to the execution of marked source code. A comparison facility is used to identify active code based on the receipt of the log messages. A service can be invoked to remove marker code from the active code identified by one or more log messages. Remaining marked code can be deemed as inactive suspects. Additional steps can process the inactive suspects to identify inactive or “dead code” code based on expiration of a time period during which the “dead code” did not emit any log messages. A further step can remove “dead code” from a code base.



CONTROLLING DATA LOGGING BASED ON A LIFECYCLE OF A PRODUCT

Thu, 03 Nov 2016 08:00:00 EDT

The embodiments are related to a log framework for controlling data sampling at client devices based on a lifecycle of a product. A product can be an application executing on a client device and/or a feature of the application. The sampling of data depends on a lifecycle of the product. For example, data may be sampled at a higher rate during a launch phase of the product, e.g., as more data may be required to analyze the behavior of the product, and then may be decreased to a lower rate when the product matures. Similarly, for a product that is in an experiment phase for a specified duration, data may be logged during the experiment phase, e.g., at a constant sampling rate, and then the logging may be terminated at the expiry of the experiment phase, thereby saving resources, e.g., processing capacity, storage capacity of the client device.



USER EXPERIENCE AS A SERVICE

Thu, 03 Nov 2016 08:00:00 EDT

A method, a system, and a computer readable storage medium for configuring a design platform to maximize a design experience and the needs of the designer while addressing a business concern. The configuration is further adjusted as necessary to account for changes based on the needs of the user, changes in a design experience level of the user, and changes in the business concern. The dynamically adapting design platform provides a streamlined user experience that addresses business concerns of the user while maintaining efficient design and a scalable and iterative approach. To provide functionality that maximizes the experience of the designer different tools are implemented in a cloud computing environment that encourage community and collaboration, integrated prototyping tools, and virtual design up skilling.



PROJECTION OF BUILD AND DESIGN-TIME INPUTS AND OUTPUTS BETWEEN DIFFERENT BUILD ENVIRONMENTS

Thu, 03 Nov 2016 08:00:00 EDT

Methods, systems, apparatuses, and computer program products are described that enable local builds to be substantially equivalent with remote builds. In embodiments, local build and design-time inputs and/or outputs of a local build environment hosted on a local computing device are projected to remote build and design-time inputs and/or outputs of a remote build environment hosted on a remote computing device. In further embodiments, remote build and design-time inputs and/or outputs of the remote build environment are projected to local build and design time inputs and/or outputs of the local build environment. In still further embodiments, first build and design-time inputs and/or outputs of a first build environment hosted on a computing device are projected to second build and design-time inputs and/or outputs of a second build environment hosted on the same computing device.



DETERMINING RECOMMENDED OPTIMIZATION STRATEGIES FOR SOFTWARE DEVELOPMENT

Thu, 03 Nov 2016 08:00:00 EDT

In one example, a device for recommending an optimization strategy for software includes a memory storing data for a sparse matrix including empty cells and non-empty cells, wherein non-empty cells of the sparse matrix represent ratings for optimization strategies previously applied to programs, and one or more hardware-based processors configured to predict values for empty cells of a sparse matrix, fill the empty cells with the predicted values to produce a complete matrix, determine, for a current program that was not included in the programs of the sparse matrix, a recommended optimization strategy that yields a highest rating from the complete matrix, and provide an indication of the recommended optimization strategy.