Subscribe: Untitled
http://www.freepatentsonline.com/rssfeed/rssapp717.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
application  based  code  computer  data  includes  information  method  set  software  source code  system  test  trace 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Untitled

Untitled





 



SOURCE CODE UNIT TESTING USING AN INDEXING TOOL

Thu, 25 Aug 2016 08:00:00 EDT

A processing device indexes source code that include test functions that test corresponding functions in the source code. The processing device determines a function in the source code that contains a change, determines a set of functions in the source code that are affected by the change in the function, identifies one or more test functions in the set of functions, and creates a list of identified test functions. The list of identified test functions is a subset of the plurality of test functions to execute for testing the change.



RECORDING AN APPLICATION TEST

Thu, 25 Aug 2016 08:00:00 EDT

Recording an application test can include creating a number of recordings that define a number of interactions with an application under test (AUT), wherein the number of recordings are created serially. Recording an application test can include replaying each of the number of recordings while the number of recordings are being created to determine an outcome of a test. Recording an application test can include analyzing and reporting the outcome of the test.



Using Script Description to Encode Conditional Statements

Thu, 25 Aug 2016 08:00:00 EDT

Implementations of using script descriptions to encode conditional statements are disclosed. A method of an implementation of the disclosure includes retrieving a description string associated with an executable script. The method also includes generating, in view of the description string, a conditional statement specifying an action to be performed. The method further includes using the conditional statement to control execution of the executable script.



GENERATING TEST CASES

Thu, 25 Aug 2016 08:00:00 EDT

Systems and techniques are described for generating test cases. A described technique includes monitoring a manual test of a code portion. The monitoring can include identifying one or more performed operations performed during the manual test. A seed file can be generated that includes data describing the one or more performed operations. A mock test can be generated for the code portion using the seed file. The mock test can include one or more mock operations that match the one or more performed operations. The mock test can be performed on the code portion, including performing the one or more mock operations using the code portion.



DATA FABRICATION BASED ON TEST REQUIREMENTS

Thu, 25 Aug 2016 08:00:00 EDT

A method for fabricating test data, comprising using a hardware processor for: receiving a plurality of data sources; receiving a plurality of targets to be populated with the test data; obtaining a plurality of data fabrication rules; receiving a fabrication use-case having a hierarchic structure and comprising one or more tasks each associated with one or more data fabrication rules and with a set of targets; formulating at least some of the data fabrication rules as corresponding constraints; and performing the following steps for each task according to the hierarchic structure of the fabrication use-case: applying, to data sources the constraints corresponding to at least some data fabrication rules associated with said each task to receive a solution, and (b) populating the associated set of targets with the solution, to receive fabricated test data.



SMART PROGRAMMING PLAYGROUNDS

Thu, 25 Aug 2016 08:00:00 EDT

Methods and arrangements for testing a code portion. A contemplated method includes: providing a workspace, at a user interface, for testing a code portion; configuring the workspace to execute the code portion; analyzing the code portion to determine at least one defining aspect of the code portion; based on the determining of at least one defining aspect, determining one or more resources referenced in the code portion; and ensuring availability of the one or more resources referenced in the code portion. Other variants and embodiments are broadly contemplated herein.



IDENTIFYING THE LINES OF CODE THAT CAUSED THE ERROR AS IDENTIFIED IN THE STACK TRACE IN A SOURCE CODE VERSION THAT GENERATED THE STACK TRACE THAT DOES NOT RESIDE ON THE USER'S COMPUTING DEVICE

Thu, 25 Aug 2016 08:00:00 EDT

A method, system and computer program product for identifying lines of code that caused an error as identified in a stack trace in a source code version that generated the stack trace. The line(s) of code in the source code version that generated the stack trace that are identified in the stack trace as causing the error are identified. If there are differences in the line(s) of code that are associated with the cause of the error between the source code version that generated the stack trace and the source code version being utilized by the user, such as a developer, then an annotated version of the source code version that generated the stack trace of the line(s) of code that caused the error is displayed to the user with highlighted differences with respect to the source code version being utilized by the user.



USING EMULATION TO DISASSOCIATE VERIFICATION FROM STIMULUS IN FUNCTIONAL TEST

Thu, 25 Aug 2016 08:00:00 EDT

Techniques for using emulation to disassociate verification from stimulus in functional test are described. In one approach, a computer stores first data representing an initial state of an application and second data representing the same initial state of a model application, wherein the model application models expected behavior of the application. The computer selects actions for the application to perform and causes both the application and the model application to perform the actions. The computer updates the first and second data to represent the state of both the application and the model application after performing the actions. The computer then compares the first and second data to determine whether both refer to the same state. In response to a determination that the first data and the second data do not refer to the same state, the computer stores data indicating a test failure.



Discovery of Code Paths

Thu, 25 Aug 2016 08:00:00 EDT

Systems and techniques are described for tracking software code paths. A described technique includes receiving a first log of stack traces that includes a respective stack trace for each of a plurality of calls to access any of a plurality of data objects created during a first execution of an application, generating, for each of the stack traces in the first log, a script for a respective probe that identifies the data object accessed by the call corresponding to the stack trace, a respective instruction called to access the data object, and whether the access is a read or a write access for the data object, generating, for at least one of the probes, a second log that identifies the data object for the respective probe and the data stored in the data object, and generating a representation of the execution of the application using the second log.



VERIFICATION OF PRODUCT RELEASE REQUIREMENTS

Thu, 25 Aug 2016 08:00:00 EDT

A method relates to identifying, by a processing device, a bug ticket stored in a data record, wherein the bug ticket is associated with a patch comprising code to fix a bug described in the bug ticket, and wherein the bug ticket comprises a version flag indicating whether the bug ticket receives all of a plurality of acknowledgements, determining, in view of a value of the version flag, that the bug ticket does not include an acknowledgement required to place the patch into a production repository, determining, in view of a set of acknowledgement flags of the bug ticket, an entity responsible for providing the acknowledgement, and transmitting a notification to the entity, wherein the notification comprises a hyperlink linked to a user interface page to provide the acknowledgement by the entity.



CHANGE BASED TESTING OF A JAVASCRIPT SOFTWARE APPLICATION

Thu, 25 Aug 2016 08:00:00 EDT

System(s) and method(s) for change based testing of JavaScript software applications are disclosed. Reference and current versions of the JavaScript software application are analyzed to identify first and second sets of JavaScript programmed components. Further, a reference set of test cases configured to test the first set of intermediate representations are accepted. Then, the first and second sets of components are transformed into first and second sets of intermediate representations and compared to identify a third set of intermediate representations that is modified when the JavaScript software application is transformed from the reference to the current version. Then, a set of impacted test cases are identified from the reference set of test cases based upon the third set of intermediate representations and change based testing is performed on the current version of the JavaScript software application based on the set of impacted test cases.



HARDWARE-BASED EDGE PROFILING

Thu, 25 Aug 2016 08:00:00 EDT

A method comprising: counting each occurrence of a hardware event by a Performance Monitoring Counter of a hardware processor during the execution of a target program code; orderly and continuously storing in a buffer of a Taken Branch Trace (TBT) Facility of said hardware processor a predefined TBT size of last taken branches of said target program code during its execution; every time said counting equals a sampling rate, triggering sampling of said buffer, to receive a TBT comprising current said predefined TBT size of last taken branches; constructing a full branch trace for each said TBT based on said target program code; extracting a predefined Chopped Branch Trace (CBT) size of last branches from each said full branch trace, to receive a chopped branch trace for said each TBT; and incrementally storing each said chopped branch trace to generate an edge profile of said target program code.



PER TENANT INITIALIZATION CHECK REMOVAL

Thu, 25 Aug 2016 08:00:00 EDT

In an approach for removing tenant initialization check per tenant for compiled code, a processor receives a request to create a tenant. A processor creates the tenant. A processor marks a current thread of the tenant as not eligible to run just-in-time (JIT) code, wherein the marking indicates that when a method is invoked, a non-JIT version of the method is executed. A processor executes initialization of a first class from an optimization list, wherein the optimization list is a configurable list of classes to be initialized prior to running JIT code. A processor determines that class initialization has been executed for all classes on the optimization list. A processor adjusts the marking to indicate that the current thread is eligible to run JIT code and that the tenant may run JIT code that assumes, without checking, that classes on the optimization list are initialized.



Method and system for implementing invocation stubs for the application programming interfaces embedding with function overload resolution for dynamic computer programming languages

Thu, 25 Aug 2016 08:00:00 EDT

Systems and methods for increasing the execution speed of external API functions invocation and runtime checks. The techniques for generating invocation stubs for an application programming interfaces embedding with functions overload resolution so that a script or program written in a dynamic high-level programming language may reuse existing code base from other high-level programming language and be more flexible than traditional approaches. The method further involves compiling the high-level code templates to native code to obtain optimized native code templates, using an optimizing compiler subsystem designed for runtime use with the virtual machine. With some of the described techniques, invocation stubs are generated by a compiler, when a corresponding API import instruction is encountered at runtime, and those stubs bridge an application programming interfaces to the actual programming language for usage.



PER TENANT INITIALIZATION CHECK REMOVAL

Thu, 25 Aug 2016 08:00:00 EDT

In an approach for removing tenant initialization check per tenant for compiled code, a processor receives a request to create a tenant. A processor creates the tenant. A processor marks a current thread of the tenant as not eligible to run just-in-time (JIT) code, wherein the marking indicates that when a method is invoked, a non-JIT version of the method is executed. A processor executes initialization of a first class from an optimization list, wherein the optimization list is a configurable list of classes to be initialized prior to running JIT code. A processor determines that class initialization has been executed for all classes on the optimization list. A processor adjusts the marking to indicate that the current thread is eligible to run JIT code and that the tenant may run JIT code that assumes, without checking, that classes on the optimization list are initialized.



ON-DEMAND LOADING OF DYNAMIC SCRIPTING LANGUAGE CODE FOR REDUCED MEMORY USAGE

Thu, 25 Aug 2016 08:00:00 EDT

A computer-implemented method and system for reducing the amount of memory space required to store applications written in dynamic scripting languages loads a program module into memory and removes a category of program code, such as debug information or function definitions, from the program module. The method and system also receives a request for debug information, or a function call or query, and determines whether or not the corresponding program code is in memory. If not, then the location in storage is identified where the program module is stored, and another copy containing the corresponding program code is loaded into memory. The corresponding program code is located and copied into the program module in memory, and a response is provided to the request.



TECHNIQUES FOR PROVIDING ENVIRONMENTAL IMPACT INFORMATION ASSOCIATED WITH CODE

Thu, 25 Aug 2016 08:00:00 EDT

A technique for providing environmental impact information associated with code includes determining, based on execution of the code on a computer system, an environmental impact of a code execution sequence included in the code. A section of the code that is associated with the code execution sequence is then annotated with environmental impact information associated with the environmental impact of the code execution sequence.



Applying Configuration Alignment in Build Projects

Thu, 25 Aug 2016 08:00:00 EDT

Implementations disclose applying configuration alignment in build projects is disclosed. A method of an implementation of the disclosure includes retrieving a build script (BS) file configuration from a BS file. The BS configuration includes a configuration to perform a build of a project The method also includes determining whether the BS configuration aligns with a target configuration. The method further includes aligning the BS configuration with the target configuration when it is determined that the BS configuration does not align with the target configuration.



DYNAMIC EXTENSIBILITY OF APPLICATION PROGRAMMING INTERFACES

Thu, 25 Aug 2016 08:00:00 EDT

A system for extending application programming interfaces provided by web service providers to interface with web services includes an application programming interface extender; a plurality of application programming interface extensions; and a catalog of the application programming interface extensions. The catalog logically links the application programming interface extensions with the application programming interfaces and provides an interface to first developers who upload the application programming interface extensions to the platform and second developers who develop applications which access the web services via the application programming interface extensions. The application programming interface extender receives requests to access given ones of the application programming interface extensions and routes at least some of the requests to the application programming interface extensions.



OPTIMIZING SOFTWARE CHANGE PROCESSES USING REAL-TIME ANALYSIS AND RULE-BASED HINTING

Thu, 25 Aug 2016 08:00:00 EDT

In one aspect, the present disclosure relates to a method which comprises obtaining a set of software change process parameters characterizing the particular process, based on the obtained set of software change process parameters, selecting hot spot information corresponding to the obtained set of software change process parameters, the hot spot information being based on a statistical analysis of previous software change processes and wherein the hot spot information identifies one or more steps of the multiple steps of the process during which problems have occurred in the previous processes, providing the hot spot information to the host computer system for use in the software change process and obtaining status information relating to the software change process at multiple times during the execution of the software change process, a level of detail of the status information being increased for steps of the process identified in the hot spot information.



Priority Status of Security Patches to RASP-Secured Applications

Thu, 25 Aug 2016 08:00:00 EDT

Prioritizing software updates in the context of runtime application self-protection (RASP) security. A software update is received for an application software that is running under the control of RASP security, which monitors the application software and works to prohibit one or more runtime operations of the application software. The software update is analyzed to determine whether any runtime operations of the application software that will be affected by the software update are any of the runtime operations prohibited by the RASP security. If the software update affects only runtime operation(s) of the application software that is prohibited, then the priority status of the software update can be downgraded.



INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM HAVING STORED THEREIN AN INFORMATION PROCESSING PROGRAM

Thu, 25 Aug 2016 08:00:00 EDT

An object is to provide an information processing apparatus and the like that can reduce power consumption of the information processing apparatus in downloading and installing. To achieve this object, whether or not there is system software update is confirmed in a low power consumption state in which only some of hardware components of the information processing apparatus are supplied with power and communication with a predetermined server can be performed. When there is the update, update data is downloaded, and at least some of the hardware components that are the update targets and that are not supplied with power in the low power consumption state are started to be supplied with power. Then, system update is executed. The series of processes are automatically executed without a user's operation.



UNIVERSAL CONNECTIVITY FOR NON-UNIVERSAL DEVICES

Thu, 25 Aug 2016 08:00:00 EDT

A system includes at least one data collection device connected to a corresponding data terminal via a primary communication channel; and a central connectivity point connected to each data collection device via a wireless secondary communication channel so as to communicate with the at least one data collection device without disrupting communication between the at least data collection device and the corresponding data terminal via the primary communication channel and to permit remote administration of each data collection device.



STORAGE CONTROL DEVICE

Thu, 25 Aug 2016 08:00:00 EDT

A storage control device includes a processor. The processor is configured to classify second type storage devices into a first group and a second group. The second type storage devices temporarily store thereof data held in a first type storage device. The processor is configured to access the first type storage device using storage devices belonging to the second group while updating firmware of storage devices belonging to the first group.



METHODS AND APPARATUS TO MANAGE APPLICATION UPDATES IN A CLOUD ENVIRONMENT

Thu, 25 Aug 2016 08:00:00 EDT

Methods, apparatus, and systems to manage application updates in a cloud environment are disclosed. Disclosed example methods include determining that a collector in a collector bank is available to process a task, the task to at least one of request an application version or request an application update and sending, the task from a task queue to the collector to determine which compute node is to execute the task. Disclosed example methods also include enqueuing the task on a target queue based on a routing key assigned to the task by the collector, the routing key to specify the compute node to execute the task, and sending the task to the compute node associated with the target compute node queue.



MANAGING FIRMWARE UPDATES FOR INTEGRATED COMPONENTS WITHIN MOBILE DEVICES

Thu, 25 Aug 2016 08:00:00 EDT

Disclosed herein is a technique for updating firmware of an embedded Universal Integrated Circuit Card (eUICC) included in a mobile device. The technique includes the steps of (1) receiving, from a firmware provider, an indication that an updated firmware is available for the eUICC, (2) in response to the indication, providing, to the firmware provider, (i) a unique identifier (ID) associated with the eUICC, and (ii) a nonce value, (3) subsequent to providing, receiving, from the firmware provider, a firmware update package, wherein the firmware update package includes (i) authentication information, and (ii) the updated firmware, (4) subsequent to verifying the authentication information, persisting, to a memory included in the mobile device, a hash value that corresponds to the updated firmware, and (5) installing the updated firmware on the eUICC.



Automatic Selection and Customization of Landscape Guides

Thu, 25 Aug 2016 08:00:00 EDT

Techniques are described for the automated selection and customization of landscape guides. Landscape guides provide instructions to a customer for making changes to customer landscapes. A customer landscape is an arrangement of servers or other computer systems. During the lifecycle of the customer landscape, the customer landscape may change due to software upgrades, software updates, or software installations. Based on a customer request for a customer landscape change, the techniques can automatically select landscape guides which are relevant to the landscape change and automatically customize the selected landscape guides such that the guides are tailored for the customer.



REPOSITORY MANAGER

Thu, 25 Aug 2016 08:00:00 EDT

A system and method to install a software application on a host computer system using a file repository located on another host computer system. The method includes installing, on a first host computer system, a virtual machine image including a file repository including one or more pre-requisites for installing a software application. The method further includes configuring a second host computer system with an identifier of the file repository. The method also includes installing the software application on a virtual machine associated with the second host computer system using the file repository.



Generic Semantic Configuration Service

Thu, 25 Aug 2016 08:00:00 EDT

Implementations provide for generic semantic configuration service for computer systems. A method of the disclosure includes installing, by a processing device, an abstract data structure representing an application, the abstract data structure comprising representation objects corresponding to high-level features of the application, installing a semantic model for the application, receiving an identification of at least one of the high-level features to be configured on at least one component executing the application, validating, using the semantic model, a configuration of the representation objects of the abstract data structure corresponding to the at least one of the high-level features, and generating low-level configuration code in a machine-readable format of the application from the representation objects corresponding to the at least one of the high-level features.



METHOD AND APPARATUS FOR CUSTOM STRATEGY SPECIFICATION IN A HOSTED ELECTRONIC TRANSACTION SERVICE SYSTEM

Thu, 25 Aug 2016 08:00:00 EDT

A merchant generates a customized service strategy related to a suite of electronic transaction services hosted by a service provider. The custom strategy specifies services to perform, and possibly an order in which to perform the services, by a service provider in relation to an electronic transaction associated with the merchant. Through use of a user interface, the strategy can be represented as a graphical decision tree, with terminal nodes representing services or actions. A customized strategy is transmitted to a service provider, as is transaction related information, whereby the service provider can service the transaction according to the strategy and based on the transaction information. Scheduling information that specifies different strategies to apply to different transaction scenarios can be generated. A strategy is selected by a service provider based on the scheduling information and transaction information, and is used to service one or more electronic transactions.



WHOLE-PROGRAM OPTIMIZATION USING DATA FROM PREVIOUS COMPILATION RUNS

Thu, 25 Aug 2016 08:00:00 EDT

An example system for compiling a source file includes an optimizer that identifies a segment of code in a first source file as a potential optimization opportunity. The first source file includes high-level source code. The example system also includes a compiler that identifies a compilation record storing data indicating that the segment of code is an actual optimization opportunity and generates a representation of the high-level source code in accordance with the actual optimization opportunity. The data is based on a previous compilation of a second source file.



COMPILER METHOD, PARALLEL PROCESSING METHOD, AND COMPILER APPARATUS

Thu, 25 Aug 2016 08:00:00 EDT

A compiler method includes: calculating, by a computer, based on a number of elements of a set of data and a number of threads, a divisor for dividing the set of data, the divisor being greater than the number of threads; generating a plurality of data subsets by dividing the set of data by the divisor; and generating, for each of the plurality of data subsets, object code that includes executable code that performs processing of the respective data subsets and an instruction that is arranged at a start of the executable code and is to be executed by a first thread that reaches first the executable code.



Leveraging Collaborative Cloud Services to Build and Share Apps

Thu, 25 Aug 2016 08:00:00 EDT

The present invention includes systems and methods for retrieving information via a flexible and consistent targeted search model that employs interactive multi-prefix, multi-tier and dynamic menu information retrieval techniques (including predictive text techniques to facilitate the generation of targeted ads) that provide context-specific functionality tailored to particular information channels, as well as to records within or across such channels, and other known state information. Users are presented with a consistent search interface among multiple tiers across and within a large domain of information sources, and need not learn different or special search syntax. A thin-client server-controlled architecture enables users of resource-constrained mobile communications devices to locate targeted information more quickly by entering fewer keystrokes and performing fewer query iterations and web page refreshes, which in turn reduces required network bandwidth. Applications are built by leveraging existing collaborative cloud services that enable the maintenance and sharing of user content.



COMPUTER PROGRAM GENERATION

Thu, 25 Aug 2016 08:00:00 EDT

A method of generating a computer program, the method comprising: receiving input data associated with an environment, the input data comprising first input data and second input data; receiving stored data based upon the environment, said stored data comprising generated computer programs; processing the input data based upon said stored data to generate said computer program, wherein said generated computer program is associated with a relationship between the first input data and second input data; and storing said generated computer program for generation of further computer programs.



CONTRACT BASED BUILDER

Thu, 25 Aug 2016 08:00:00 EDT

Methods, systems, and computer program products are included for integrating software components. Source code corresponding to the software components is parsed to identify method calls. Method contracts, which contain identifying information corresponding to the method calls, are determined. The method contracts are used to query a dependency data store to identify dependencies that correspond to the method calls. Dependencies that are determined for a component are compared with dependencies for another component in order to identify dependencies that may be used to build the components together, and also to identify conflicting dependencies.



TASK SEQUENCER

Thu, 25 Aug 2016 08:00:00 EDT

A method for modifying a software application. The method includes selecting a first node in a graph. The graph represents logic of a software application. The first node is loaded into a memory. A function associated with the first node is executed by passing to the function one or more parameters associated with the first node. The first node is set to a state returned by the function. A first edge attached to the first node that matches the state returned is selected by the function. The first edge is followed to a second node.



AN OPERATION AND MANAGEMENT SYSTEM FOR E-COMMERCE APPLICATION ON MOBILE DEVICE, METHOD THEROF, AND APPLICATION GERNERATOR

Thu, 18 Aug 2016 08:00:00 EDT

The present disclosure relates to an operation and management system providing applications for mobile devices and an electronic transaction method and an application generator thereof. The operation and management system comprises an application generator used to receive first data from a store's store end equipment and create the store's dedicated application which can be downloaded by a portable devices; the operation and management system comprises a data setter used to receive second data from the store's store end equipment and depending on the second data changeable for the dedicated application to complete configuration; the operation and management system comprises an data providing unit that is activated in the portable device, which links the operation and management system for execution of the application, and used in exporting first data and second data corresponding to the application so that transactions are completed in the operation and management system by the portable device in which the application UI is operated.



PROFILING SYSTEM FOR COMPUTING DEVICES

Thu, 18 Aug 2016 08:00:00 EDT

Systems and methods for profiling application code are disclosed. The method is hybrid in nature as it may include inserting instrumentation within application code and also periodic sample gathering, by employing a runtime app profile generator that provides the hybrid profiling infrastructure and is linked to the application code. An executable user application is then generated from the application code, and the executable user application is executed. The runtime app profile generator is then launched in response to the execution of the application code, and hybrid profiling results are generated by obtaining samples from the different threads of the executed application code and accumulating instrumented execution information. In some implementations, the hybrid profiling results capture even cold regions of the code and can also be used for a next round of profiling through automated targeted instrumentation.



SMALL SCALE INTEGRATION TEST GENERATION

Thu, 18 Aug 2016 08:00:00 EDT

Provided are methods and systems for automated generation of small scale integration tests to keep mocked input-output contract expectations of external objects synchronized with the actual implementation of the external objects. Such synchronization is achieved through automated creation of small scale integration tests by replacing expected input-output behaviors of mocked interactions with actual code sequences of the mocked interaction. The methods and systems utilize automated test generators with search-based software engineering methods to reuse and adapt developer written tests into new automatically generated tests.



Identity Propagation through Application Layers Using Contextual Mapping and Planted Values

Thu, 18 Aug 2016 08:00:00 EDT

Mechanisms are provided for propagating source identification information from an application front-end system in an application layer to a data layer inspection system associated with a back-end system. An incoming user request is received, at the data layer inspection system, from a gateway system associated with the application front-end system. One or more outgoing statements targeting a back-end system are received at the data layer inspection system. The data layer inspection system accesses a mapping data structure based on the one or more outgoing statements to thereby correlate the one or more outgoing statements with the incoming user request. The data layer inspection system retrieves source identification information associated with the incoming user request based on the correlation of the one or more outgoing statements with the incoming user request. The data layer inspection system performs a data layer inspection operation based on the source identification information.



DEBUGGING OF A DATA PROCESSING APPARATUS

Thu, 18 Aug 2016 08:00:00 EDT

A data processing apparatus is provided comprising data processing circuitry and debug circuitry. The debug circuitry controls operation of the processing circuitry when operating in a debug mode. The data processing circuitry determines upon entry into a debug mode a current operating state of the data processing apparatus. The data processing circuitry allocates one of a plurality of instruction sets to be used as a debug instruction set depending upon the determined current operating state.



SOFTWARE COMMIT RISK LEVEL

Thu, 18 Aug 2016 08:00:00 EDT

A risk level of a software commit is assessed through the use of a classifier. The classifier may be generated based on attributes pertaining to previous commits and used to determine a risk level for deployment of a software commit into a production environment based on attributes extracted from the software commit



BLACK-BOX SOFTWARE TESTING WITH STATISTICAL LEARNING

Thu, 18 Aug 2016 08:00:00 EDT

A method to determine a relationship between inputs and outputs based on a parametric model may include receiving a data set that includes known inputs and corresponding known outputs associated with a component. The method also includes generating a parametric model to automatically determine a functionality of the component based on the data set by selecting the parametric model from multiple types of parametric models based on a data type associated with the data set. The method also includes determining whether the parametric model applies to the data set. The method also includes, responsive to determining that the parametric model applies to the data set, receiving a new output associated with the component. The method also includes determining a new input from the new output based on the parametric model.



EMBEDDING AND EXECUTING TRACE FUNCTIONS IN CODE TO GATHER TRACE DATA

Thu, 18 Aug 2016 08:00:00 EDT

Provided are a computer program product, system, and method for embedding and executing trace functions in code to gather trace data. A plurality of trace functions are embedded in the code. For each embedded trace function, a trace level is included indicating code to which the trace applies. The trace level comprises one of a plurality of levels. During the execution of the code, the embedded trace functions having one of the levels associated with a specified at least one level specified are executed. The embedded trace functions associated with at least one level not comprising one of the at least one specified level are not invoked.



RUNTIME DISPATCHING AMONG A HEREROGENEOUS GROUPS OF PROCESSORS

Thu, 18 Aug 2016 08:00:00 EDT

Systems, apparatus, articles, and methods are described including operations for runtime dispatching among a heterogeneous group of processors.



Method and Apparatus for Application Management and Control

Thu, 18 Aug 2016 08:00:00 EDT

A system includes a processor configured to load a dashboard application including control over a secondary application. The processor is also configured to determine, via the dashboard application, a condition associated with the launch of the secondary application. Further, the processor is configured to determine if the condition has occurred and, upon occurrence of the condition, instruct launch of the secondary application from the dashboard application.



COBOL COPYBOOK CONFIGURATION SYSTEM USABLE IN AN EMULATED INTEGRATED DEVELOPMENT ENVIRONMENT (IDE)

Thu, 18 Aug 2016 08:00:00 EDT

A method and apparatus for copy process configuration in an emulated integrated development environment (IDE). The configuration may allow users to easily refer to the files that contain copy processes. Users may configure copy processes just by specifying the workfile names that contain the elements of the copy process definitions. Users may also view the absolute path of the definition files selecting a copy process name in a program code.



SELF-MENDING SOFTWARE BUILDER

Thu, 18 Aug 2016 08:00:00 EDT

Implementations of the disclosure provide for a self-amending software builder. A method of the disclosure includes performing at least one test on an application having source code that is stored in a source code repository and has incurred a plurality of code changes by a plurality of users; detecting a failure of the application during the test; identifying, using a processing device, an offending code change of the plurality of code changes corresponding to the failure and at least one dependent code change of the plurality of code changes that depends on the offending code change; and updating, using the processing device, a master copy of the application in view of at least one of the offending code change or the dependent code change.



DEPLOYING AN APPLICATION IN A CLOUD COMPUTING ENVIRONMENT

Thu, 18 Aug 2016 08:00:00 EDT

A system and technique for deploying an application in a cloud computing environment includes: a collecting module executable by a processor unit to collect, while a user is deploying an application, metadata and instructions issued by the user on deploying the application, the metadata comprising service metadata, application metadata and topology metadata, wherein the service metadata comprise metadata on a service required for deploying the application, the application metadata comprise metadata on the application, and the topology metadata comprise metadata indicative of a relationship between the service and the application; and a storing module executable by the processor unit to store the collected metadata and instructions as a model for re-deploying the application.



MODULE UPDATING DEVICE

Thu, 18 Aug 2016 08:00:00 EDT

An automobile, vehicle, vessel or other device may include a plurality of modules, software applications, computer program products, controllers or other logically executing entities to facilitate controlling, implementing or otherwise enabling various operations according to computer-readable instructions, code or other information stored within a memory, such as within a file or other memory construct. A controller having capabilities sufficient to facilitate updating, modifying, creating or otherwise manipulating such stored files and/or corresponding instructions is contemplated.