Subscribe: Untitled
http://www.freepatentsonline.com/rssfeed/rssapp717.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
application  based  code  computer  data  device  method  plurality  processor  program  set  software  source code  system 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Untitled

Untitled





 



SYSTEM AND METHOD FOR OPTIMIZING RISK DURING A SOFTWARE RELEASE

Thu, 27 Oct 2016 08:00:00 EDT

This disclosure relates generally to software release management, and more particularly to a system and method for optimizing risk during a software release. In one embodiment, a method is provided for determining a risk associated with a release of a software product. The method comprises gathering a plurality of parameters related to the software product, determining a plurality of complexity levels based on the plurality of parameters, determining a stability of the software product based on a stability of a baseline software product, determining an overall complexity level of the release of the software product based on the plurality of complexity levels and the stability of the software product, and determining the risk associated with the release of the software product based on the overall complexity level.



RESOURCE-CONSTRAINED TEST AUTOMATION

Thu, 27 Oct 2016 08:00:00 EDT

Automating testing of a software product under system resource constraints. One or more SQAs are received and, for each SQA, a confidence level and an importance are received. For one or more system resources, an amount of each system resource available for testing is received. Each amount of system resource available for testing is apportioned to the SQAs, based on the confidence level and the importance of each SQA. Each test in a set of tests is prioritized, based on the number of SQAs associated with the test and any previous results of the test. For each SQA, a subset of the set of tests is selected, based on the test priorities, an expected consumption of system resources by each test, and the apportionment of the system resources to the SQA; the selected subset of tests is executed; and the test results for the selected subset of tests is updated.



SYSTEM AND METHOD TO INFER CALL STACKS FROM MINIMAL SAMPLED PROFILE DATA

Thu, 27 Oct 2016 08:00:00 EDT

Methods and systems for inferring call stacks in a program, such as a video game or simulation program, are described herein. The call stack data can be inferred using a database of previously captured call stacks along with a minimal set of identifiers that fingerprint each call stack. If just the minimal fingerprint can be captured during a subsequent profile, then the corresponding call stack can be inferred.



TEST CASE GENERATION IN A DEVELOPMENT ENVIRONMENT

Thu, 27 Oct 2016 08:00:00 EDT

A development system comprises a user interface component and a customization component configured to receive developer customization inputs and to customize a portion of a computing system based on the developer customization inputs. The portion comprises types modeled in the computing system. The development system also comprises a test generation component configured to identify a test value by accessing a test knowledge set based on the types, control the user interface component to generate a user interface display that displays an indication of the test value, and generate a test for the portion of the computing system.



Software Defect Detection Identifying Location of Diverging Paths

Thu, 27 Oct 2016 08:00:00 EDT

Embodiments detect differences between software systems by comparing statements collected therefrom in an order of execution. Highlighting point(s) of divergence between the executed statements allows rapid localization of differences between the software systems, which may be minor and otherwise difficult to discern within large volumes of underlying code. In some embodiments a highlighted departure in statement order may be attributable to slight code differences between the two software systems. In other embodiments the software systems may have identical code but reference different configuration data (e.g. as configuration files), a subtle distinction also revealed by comparing an order of executed statements. Certain embodiments may perform tracing/comparison between an order of execution of only selected statement types (e.g., SQL operations, database access, kernel events) based upon their specificity and ability to reveal significant functional differences. This can reduce processing and/or memory burden(s) when comparing lengthy volumes of executed statements between complex systems.



SYSTEMS INCLUDING NETWORK SIMULATING FOR MOBILE APPLICATION DEVELOPMENT

Thu, 27 Oct 2016 08:00:00 EDT

A system, method and software product emulate and profile an application playing on a mobile device. The mobile device is emulated using a model based upon characteristics related to performance of the mobile device. The application is played and monitored within the model to determine resource utilization of the application for the mobile device.



METHOD AND SYSTEM FOR ASSISTING IN THE VERIFICATION AND VALIDATION OF AN ALGORITHM CHAIN

Thu, 27 Oct 2016 08:00:00 EDT

Method and system for assisting in the verification and validation of an algorithm chain. The system (1) comprises an instrumentation module (2) of an algorithm chain, providing automatic data capture including at least some of the following data: interface data and internal algorithm data of the algorithm chain, a module (3) for automatic verification of functional rules, a learning module (5) for the modelling by learning of the constraints and algorithm criteria of the algorithm chain, and taking account of the validations performed by a human operator, and a module (7) for automatic detection of bugs and functional problems in of the algorithm chain using statistical learning means.



METHOD AND SYSTEM FOR MEASURING A RUNTIME BY MEANS OF WATCHPOINTS

Thu, 27 Oct 2016 08:00:00 EDT

A runtime of a computer program may be measured by providing the compiled computer program with at least a first watchpoint and a second watchpoint at respective first and second code locations, running the compiled computer program on a computing device, measuring a first time parameter at the first watchpoint and a second time parameter at the second watch-point, and determining the runtime of at least part of the compiled computer program in terms of the second time parameter and the first time parameter.



DETECTING UNINITIALIZED MEMORY REFERENCES

Thu, 27 Oct 2016 08:00:00 EDT

A pre-initialized value of contents of a memory location is identified. A load value of contents loaded from the memory location by execution of a first instruction that loads from the memory location is also identified. A comparison is made between the load value and the pre-initialized value. Based on the comparison, a determination is made that the load value and the pre-initialized value are the same. In response to this determination, it is indicated that the first instruction contains an uninitialized memory reference.



METHOD FOR PROCESSING DYNAMIC LANGUAGE AND ELECTRONIC DEVICE USING THE SAME

Thu, 27 Oct 2016 08:00:00 EDT

Methods and apparatuses are provided for processing a dynamic language application in an electronic device. A first machine code is generated using a first processor and a second machine code is generated using a second processor, for the dynamic language application. The dynamic language application is processed by executing the first machine code. The first machine code is replaced with the second machine code. Processing of the dynamic language application is continued by executing the second machine code.



EXTENSIBILITY BUNDLES FOR A CLOUD AND DEVICES SUITE

Thu, 27 Oct 2016 08:00:00 EDT

An interface mechanism is provided for developers to bundle together a set of extensions (or add-ins) to a productivity suite allowing end users and system administrators to manage their lifecycle in a unified way. Aspects such as discovery, acquisition, authorization deployment, management, updates, and similar ones ma be addressed for the bundle as opposed to each of the different extensions (for example extensions for different versions of the same application such as desktop version, web application version, mobile version, etc.). Bundles may also provide a means to match specific functional sets or commercial offerings to specific user or customer profiles.



Method and Apparatus for Manufacturing File System Update Package, Method and Apparatus for Updating File System Update Package, and Terminal

Thu, 27 Oct 2016 08:00:00 EDT

The method for manufacturing a file system update package, includes: file information of each source file in a file system to be updated is acquired; an operation type of a target file corresponding to each source file is determined according to the file information of each source file, the operation type including one of a dynamic type, a static type and a recently-added type; when the operation type of the target file is the dynamic type or the recently-added type, the target file is compressed to form a compressed file package, and when the operation type of a certain target file is the static type, a differential operation is executed according to a difference between the target file and the corresponding source file to form a differential file package; and all the compressed file packages and all the differential file packages are packaged to form a file system update package.



DEVICE AND METHOD FOR PROVIDING CODE BLOCKS TO A CLIENT DURING EXECUTION OF SOFTWARE CODE

Thu, 27 Oct 2016 08:00:00 EDT

A client has a block of the code to be executed, executes the part and then determines the next block and requests it from a server that returns the block and a list of possible following blocks, and updates a list of blocks executed by the client. The client then executes the next block. To modify the program, it is sufficient to patch the corresponding block or blocks on the server. The transition system, which defines possible following blocks, is modified to integrate the new block in place of the old one. Depending on the modifications, it may be necessary to patch the memory of the client too. In this case, a complement block is added in order to modify the client memory to be compatible with the new block.



METHOD AND SYSTEM FOR UPDATING SOFTWARE

Thu, 27 Oct 2016 08:00:00 EDT

A method for updating software includes verifying an update for first software that drives a security execution environment in a non-security execution environment, updating the first software by use of a first image of the first software update stored in the non-security execution environment, verifying an update for second software that drives a security device controlled by the security execution environment, in the security execution environment, and updating the second software by use of a second image of the second software update stored in the security execution environment.



SYSTEM AND METHOD OF UPDATING A NETWORK ELEMENT

Thu, 27 Oct 2016 08:00:00 EDT

A method and apparatus of a device that performs a hitless update a boot image of a network element. In this embodiment, the device identifies the network element to update and determines if the network element has redundant paths. If this network element has redundant paths, the device configures the network element to drain data processing of the network element. In addition, the device updates the network element to a new boot image when the data processing of the network element is drained.



COMPILER FOR TRANSLATING BETWEEN A VIRTUAL IMAGE PROCESSOR INSTRUCTION SET ARCHITECTURE (ISA) AND TARGET HARDWARE HAVING A TWO-DIMENSIONAL SHIFT ARRAY STRUCTURE

Thu, 27 Oct 2016 08:00:00 EDT

A method is described that includes translating higher level program code including higher level instructions having an instruction format that identifies pixels to be accessed from a memory with first and second coordinates from an orthogonal coordinate system into lower level instructions that target a hardware architecture having an array of execution lanes and a shift register array structure that is able to shift data along two different axis. The translating includes replacing the higher level instructions having the instruction format with lower level shift instructions that shift data within the shift register array structure.



Systems and Methods of Implementing Extensible Browser Executable Components

Thu, 27 Oct 2016 08:00:00 EDT

The technology disclosed describes systems and methods for implementing extensible browser executable components, such as popup controls for action, checkbox and radio button dropdown menus, modals, dialogs, date pickers and autocompletes. The disclosed technology systems and methods can also be used for rendering executable components for mobile application interfaces. The technology further discloses systems and methods for providing support for developers whose goal is to render specific implementations of browser executable components. The technology disclosed also describes systems and methods for bypassing suppression of DOM click event bubbling for a popup controls for action, checkbox and radio button dropdown menus, modals, dialogs, date pickers and autocompletes; and discloses systems and methods for implementing modal interaction between an iframe and a popup control.



Computer-implemented method for generating and visualizing data structures

Thu, 27 Oct 2016 08:00:00 EDT

A computer-implemented method for generating and visualizing data structures, notably hierarchal data structures, comprising a plurality of nodes in a tree structure, at least some of which comprise intrinsic properties, wherein at least one of said primary and secondary nodes represents a data object of or a data interface towards a computer-implemented model of a physical structure. A visual representation of the plurality of nodes is created in a graphical user interface of the computer system. A user of the computer system is allowed to select data modules and to combine the selected data modules to build the data structures. Functional relations between data values of the nodes are provided to at least partially define the computer-implemented model on the basis of the intrinsic data of the nodes and on the basis of the mutual functional relations. The user interface comprises functionality permitting a user of the computer system to define functions which can be referenced in or called by the functional relations.



CONFIGURATION-PRESERVING PREPROCESSOR

Thu, 27 Oct 2016 08:00:00 EDT

Methods, systems, and apparatuses, including computer programs encoded on computer readable media, for generating a plurality of tokens from one or more source files. The one or more source files include source code in a first programming language. The source code includes one or more static conditionals that include a conditional expression and branch code that is operative when the conditional expression is true. Various configurations are possible based upon the conditionals. A first static conditional that includes one or more nested static conditionals within the branch code associated with the first static conditional is determined. Each of the one or more nested static conditionals is hoisted to a beginning of the branch code associated with the first static conditional. Each innermost branch code does not contain a static conditional, and each possible configuration is preserved.



Virtual Image Processor Instruction Set Architecture (ISA) And Memory Model And Exemplary Target Hardware Having A Two-Dimensional Shift Array Structure

Thu, 27 Oct 2016 08:00:00 EDT

A method is described that includes instantiating, within an application software development environment, a virtual processor having an instruction set architecture and memory model that contemplate first and second regions of reserved memory. The first reserved region is to keep data of an input image array. The second reserved region is to keep data of an output image array. The method also includes simulating execution of a memory load instruction of the instruction set architecture by automatically targeting the first reserved region and identifying desired input data with first and second coordinates relative to the virtual processor's position within an orthogonal coordinate system and expressed in the instruction format of the memory load instruction.



SOLUTION MODELING AND ANALYSIS TOOLSET FOR ENTERPRISE SOFTWARE ARCHITECTURE

Thu, 27 Oct 2016 08:00:00 EDT

Modeling an enterprise architecture includes associating a plurality of desired business capabilities with a plurality of requirements and associating each of a plurality of technology components with one or more of the plurality of requirements, based on a respective technology supporting the one or more requirements. Then a model may be constructed that includes linking each of the technology components with one or more of the desired business capabilities based on the associating of the plurality of desired business capabilities with the plurality of requirements and the associating of each of the plurality of technology components with one or more of the plurality of requirements.



Context-Based Selective Downloading of Application Resources

Thu, 20 Oct 2016 08:00:00 EDT

One or more techniques and/or systems are provided for generating a bundle package, digitally signing the bundle package, selectively distributing the bundle package, and/or indexing one or more resource packages retrieved from the bundle package. That is, a bundle package (e.g., an application or game bundle package) comprises one or more app packages comprising application code configured to execute on various computing environments (e.g., operating systems, processors, etc.). The bundle package may comprise one or more resource packages comprising supplemental data used to provide optional user experience functionality for the application (e.g., French language support, high resolution textures, a gaming pad support, etc.). In this way, a client device may selectively download portions of the bundle package that may be relevant, which may mitigate download bandwidth, storage space, or resources otherwise used to obtain unnecessary portions of the bundle package (e.g., a tablet device may merely download low resolution textures).



QUALITY PREDICTION

Thu, 20 Oct 2016 08:00:00 EDT

A set of predicted binary quality indexes is created from a sample set of application lifecycle information and customer encountered defects (CED) for each module id and revision (rev) pair for each application. Normalized effort and quality related factors are extracted for each module id and rev pair of each application. A binary quality index is created based on a set of weighted CED ratings for each module id and rev pair of each application. A prediction model for the binary quality index is created by training a decision tree-based classifier with the sample set to create a set of prediction weights for each effort and quality factor. The set of prediction weights is applied to the effort and quality related factors to each module id and rev pair of an application under-development to create the set of predicted binary quality indexes.



AUTOMATED ERROR CHECKING SYSTEM FOR A SOFTWARE APPLICATION AND METHOD THEREFOR

Thu, 20 Oct 2016 08:00:00 EDT

A test system for providing automatic testing of an application on a plurality of devices, the system including an input/output device for communicating with the plurality of devices, a processor and a memory that stores instructions which cause the processor to install an application on a device, monitor the device as it performs a series of steps, and record the results of the series of steps in a log.



TRANSLATION VERIFICATION TESTING

Thu, 20 Oct 2016 08:00:00 EDT

An aspect includes a computer system with a widget hierarchical layout correlation parser to: receive widget objects and widget object methods; and generate, based on the widget objects and widget object methods and using a symbol table derived from semantic analysis, a multi-level tree-like widget layout structure including nodes respectively corresponding to the widget objects and relationships between the nodes, with: (i) the relationships between the nodes including relationship types including: siblings, parents, children and self, and (ii) a determination of relationships for each node determines any parent(s), sibling(s) and/or children within one level of the multi-level tree-like widget layout structure. For each given widget object, a resource string reference parser parses source code of the given widget object to: collect setMethods arguments for the given widget object, and trace back to a message key in a resource file associated with the given widget object according to the symbol table.



CUSTOMIZED APPLICATION PERFORMANCE TESTING OF UPGRADED SOFTWARE

Thu, 20 Oct 2016 08:00:00 EDT

A method for providing a plurality of customized remote environments for application performance testing is provided. The method may include identifying a plurality of client customizations associated with a client application. The method may also include identifying a plurality of client hardware configurations associated with the client application. The method may further include populating a plurality of upgraded versions of the client application. Additionally, the method may include provisioning at least one remote environment. The method may also include applying the plurality of client customizations of the client application to the plurality of upgraded versions of the at least one client application. The method may further include deploying the plurality of upgraded versions of the at least one client application on at least one environment, whereby the deployed plurality of upgraded versions has the applied identified plurality of client customizations of the at least one client application.



CALL STACK DISPLAY WITH PROGRAM FLOW INDICATION

Thu, 20 Oct 2016 08:00:00 EDT

A computer implemented method for identifying program flow in a computer program, executing in a debugger on at least one processor, subsequent to suspending execution of the computer program at a user breakpoint can include suspending execution of the computer program at a first user breakpoint, setting, by the debugger, one or more tracking breakpoints in one or more routines that can continue execution from the first user breakpoint, then resuming execution of the computer program. The method may be continued by suspending execution of the computer program at a second user breakpoint after processing by the at least one processor at least one instruction of the computer program. The method may further include determining whether to provide an indicator to indicate that at least one of the one or more tracking breakpoints was hit during the executing, and providing the indicator in response to determining to provide the indicator.



CALL STACK DISPLAY WITH PROGRAM FLOW INDICATION

Thu, 20 Oct 2016 08:00:00 EDT

A computer implemented method for identifying program flow in a computer program, executing in a debugger on at least one processor, subsequent to suspending execution of the computer program at a user breakpoint can include suspending execution of the computer program at a first user breakpoint, setting, by the debugger, one or more tracking breakpoints in one or more routines that can continue execution from the first user breakpoint, then resuming execution of the computer program. The method may be continued by suspending execution of the computer program at a second user breakpoint after processing by the at least one processor at least one instruction of the computer program. The method may further include determining whether to provide an indicator to indicate that at least one of the one or more tracking breakpoints was hit during the executing, and providing the indicator in response to determining to provide the indicator.



AUTOMATIC REPAIR OF SCRIPTS

Thu, 20 Oct 2016 08:00:00 EDT

A method and associated system for repairing a running script. A missed object is detected among one or more objects of the running script, the missed object being unrecognized from an original object of a previous running of the script. A change type of the detected missed object is determined. The script is repaired based on the change type.



MODELING MEMORY USE OF APPLICATIONS

Thu, 20 Oct 2016 08:00:00 EDT

A method includes receiving a program code at a processor. The method also includes generating, via the processor, a heap model corresponding to the program code. The method further includes detecting, via the processor, a linearizable data structure in the program code. The method also further includes modifying, via the processor, the heap model based on the detected linearizable data structure. The method also further includes analyzing, via the processor, the program code using the modified heap model.



Projection of software and integrated circuit diagrams into actual 3D space

Thu, 20 Oct 2016 08:00:00 EDT

Embodiments of the present invention include apparatus, method, and program product for displaying in actual 3D space (i.e. not merely a 3D representation on a 2D surface) any type of diagram relating to software or integrated circuits that requires depth perception in order to be fully comprehended. The 3D space can be manipulated as desired, including but not limited to rotation, collapse/expand, and the ability of the user to enter the 3D space and view it from within the 3D space.



DEBUG MANAGEMENT USING DYNAMIC ANALYSIS BASED ON STATE INFORMATION

Thu, 20 Oct 2016 08:00:00 EDT

Disclosed aspects include a debugger evaluating an expression. The expression has a debug element. Using dynamic analysis, a set of state information related to the debug element is identified. The set of state information can be generated external to the debugger and used within the debugger subsequent to being generated. Utilizing the set of state information, a tolerance parameter is selected. The tolerance parameter is for a conditional breakpoint linked with the debug element. In response to selecting the tolerance parameter, a triggering event for the conditional breakpoint may be detected. Based on the tolerance parameter, it may be determined to disregard the triggering event. Subsequently, the triggering event can be disregarded. Altogether, aspects of the disclosure provide a methodology for debug management that may provide performance or efficiency benefits.



DEBUG MANAGEMENT USING DYNAMIC ANALYSIS BASED ON STATE INFORMATION

Thu, 20 Oct 2016 08:00:00 EDT

Disclosed aspects include a debugger evaluating an expression. The expression has a debug element. Using dynamic analysis, a set of state information related to the debug element is identified. The set of state information can be generated external to the debugger and used within the debugger subsequent to being generated. Utilizing the set of state information, a tolerance parameter is selected. The tolerance parameter is for a conditional breakpoint linked with the debug element. In response to selecting the tolerance parameter, a triggering event for the conditional breakpoint may be detected. Based on the tolerance parameter, it may be determined to disregard the triggering event. Subsequently, the triggering event can be disregarded. Altogether, aspects of the disclosure provide a methodology for debug management that may provide performance or efficiency benefits.



MODELING MEMORY USE OF APPLICATIONS

Thu, 20 Oct 2016 08:00:00 EDT

A method includes receiving a program code at a processor. The method also includes generating, via the processor, a heap model corresponding to the program code. The method further includes detecting, via the processor, a linearizable data structure in the program code. The method also further includes modifying, via the processor, the heap model based on the detected linearizable data structure. The method also further includes analyzing, via the processor, the program code using the modified heap model.



SYSTEMS AND METHODS FOR DATA BRICK CREATION AND USE

Thu, 20 Oct 2016 08:00:00 EDT

Data Brick is a state of the art solution to access the data through high speed data access mechanism that is exceptionally fast and is associated with low CPU consumption cost. The Data Brick stores relatively static reference data in the form of a programming language Load Module. The Load module contains the data can be launched into the application program memory and this data can be accessed very efficiently in a programming language program. Static application data that is accessed by multiple applications in a mainframe Batch environment is a prime candidate for the Data Brick.



VISUALIZING A CONGRUENCY OF VERSIONS OF AN APPLICATION ACROSS PHASES OF A RELEASE PIPELINE

Thu, 20 Oct 2016 08:00:00 EDT

A system for visualizing a congruency of versions of an application across phases of a release pipeline includes a selecting engine to select a phase from a number of phases; a representing engine to represent, via a user interface (UI), a congruency for a number of versions of an application compared against a target version of the application across the phases of a release pipeline, the congruency for the number of versions of the application represented with identifiers; a differentiating engine to differentiate a latest-deployed version of the application against a planned version of the application in a particular environment; and a comparing engine to compare, based on a selection, properties of the versions of the application.



Layered Business Configuration

Thu, 20 Oct 2016 08:00:00 EDT

A system, a method, and a computer program product for providing a layered business configuration are disclosed. A configuration information for configuring an application object of a software application is obtained. The configuration information is arranged in at least one configuration staging table. The configuration staging table contains at least one configuration object. The configuration object contained in the configuration staging table is activated. Based on the activated configuration object, at least one configuration runtime table for configuring the application object is generated.



DETERMINING ERRORS AND WARNINGS CORRESPONDING TO A SOURCE CODE REVISION

Thu, 20 Oct 2016 08:00:00 EDT

The method of tracking errors and warnings of a revision of source code includes a computer processor that receives a first and second revision of source code. The computer processor determines a first set of errors and warnings included in the first revision of the source code and a second set of errors and warnings included in the second revision of the source code. The computer processor identifies a third set of errors and warnings that appear in the first revision of the source code, and absent in the second revision of the source code, and the computer processor identifies a fourth set of errors and warnings that are absent in the first revision of the source code and that appear in the second revision of the source code.



VISUALIZING A CONGRUENCY OF VERSIONS OF AN APPLICATION ACROSS PHASES OF A RELEASE PIPELINE

Thu, 20 Oct 2016 08:00:00 EDT

A system for visualizing a congruency of versions of an application across phases of a release pipeline includes a selecting engine to select a phase from a number of phases; a representing engine to represent, via a user interface (UI), a congruency for a number of versions of an application compared against a target version of the application across the phases of a release pipeline, the congruency for the number of versions of the application represented with identifiers; a differentiating engine to differentiate a latest-deployed version of the application against a planned version of the application in a particular environment; and a comparing engine to compare, based on a selection, properties of the versions of the application.



VEHICLE CONTROL STORAGE METHODS AND SYSTEMS

Thu, 20 Oct 2016 08:00:00 EDT

A vehicle can include methods and systems to update controls for a plurality of vehicle systems that operate using updatable controls, wherein each control is mounted in vehicle persistent memory as an image. The controls are stored in non-volatile vehicle memory that has a size less than twice a size of all of the controls loaded thereon. A core system provides access to the control images in the memory.



METHOD OF UPDATING FIRMWARE USING SINGLE OPTICAL PORT COMMUNICATION AND MICROCONTROLLER CAPABLE OF UPDATING FIRMWARE

Thu, 20 Oct 2016 08:00:00 EDT

A method of updating firmware using single optical port communication and a microcontroller (MCU) capable of updating firmware using single optical port communication are disclosed herein. The method includes detecting the voltage of a battery when a firmware update start code is received by a single optical port, transmitting firmware-related information to the transmitter if the detected voltage of the battery is equal to or higher than a predetermined reference voltage, receiving update data corresponding to an update mode, and storing rollback information related to previous version of firmware and also performing an update to new version of firmware in a first mode, and updating the predetermined data of the previous version of firmware using the update data in a second mode.



PRE-HEATED SOFTWARE INSTALLATION

Thu, 20 Oct 2016 08:00:00 EDT

Some embodiments of a method and an apparatus for pre-heated software installation have been presented. In one embodiment, packages of updates to software are downloaded from a remote source to a computing system in a background operation of a computing environment in the computing system. Then installation of the packages of the updates is initiated automatically in the background operation in an isolated manner without committing to the software updates.



REMOTE DISTRIBUTION OF A SOFTWARE UPDATE TO REMOTE-READING TERMINALS

Thu, 20 Oct 2016 08:00:00 EDT

A method of managing a software update of a plurality of remote-reading terminals to be updated in a remote-reading installation comprising a plurality of access points and a management server is disclosed, The method may include steps of transmitting a message for planning reception of the update data to said plurality of remote-reading terminals to be updated, selecting a set of access points from among said plurality of access points in such a way as to limit the number of access points used to disseminate said update data, and sending said update data through said selected set of access points.



METHOD AND DEVICE FOR REMOTELY UPDATING APPLICATION PROGRAM

Thu, 20 Oct 2016 08:00:00 EDT

The invention relates to computer technology, and in particular, to a method for achieving remote updating of application programs in a distributed application environment as well as a terminal management system for realizing the method. In a method for achieving remote updating of application programs in an application environment, the application environment comprises a terminal manager, downloading nodes and terminals, wherein the terminals are communicatively coupled with the terminal manager and the downloading nodes via network, and the method comprises the following steps: when the issuing time point of updating data packets of application programs is reached, the terminal manager sends the updating data packets to a plurality of nodes synchronously; in response to an initiation of an interaction process between the terminal manager and one of the plurality of terminals, the terminal manager determines whether the terminal is an object for which a remote updating of application programs is executed; if the terminal is an object for which a remote updating of application programs is executed, the terminal manager designates at least one downloading node for this terminal, and sends an identifier of the updating data packets and the address of the designated downloading node to this terminal; and when the updating time point of application programs is reached, an application program updating operation is executed on the terminal that has successfully downloaded the updating data packets.



MANAGING A SOFTWARE-PATCH SUBMISSION QUEUE

Thu, 20 Oct 2016 08:00:00 EDT

Queued software patches are analyzed before one patch is chosen as the next patch to be integrated into a working build. The chosen patch might not be next in chronological order of arrival at the queue. Instead, an illustrative build server applies a number of priority factors to every patch awaiting integration in the patch queue, specifically by analyzing one or more relevant attributes of the patch. The patch that receives the highest priority score in the course of the evaluation is then extracted for integration. After the patch has been integrated, the build server (e.g., using an illustrative patch queue manager module) circles back and again evaluates all the patches in the current queue, which may have queued new patches that were submitted while the previous patch was being integrated. Relative to a default chronological order, a given patch may receive a boost in priority or, conversely, may have its priority reduced.



FIRMWARE UPDATE BY USB CC

Thu, 20 Oct 2016 08:00:00 EDT

A firmware update of a USB device is described. In an example, a method comprises: communicating from a first device to a second device by a configuration channel of a universal serial bus; identifying, by the first device, that the second device supports a firmware update mode for an update of a firmware of the second device; commanding, by the first device, the second device to enter the firmware update mode; receiving, by the first device, information of the firmware from the second device; based on the received firmware information, obtaining, by the first device, the update of the firmware; and sending, by the first device, the update of the firmware to the second device, wherein the steps of identifying, commanding, receiving, and sending are conducted by the communication via the configuration channel of the universal serial bus. In other examples, a computer program product and a device are discussed along with the features of the method.



VEHICLE APPLICATION STORE FOR CONSOLE

Thu, 20 Oct 2016 08:00:00 EDT

The present disclosure is directed to an application store on board a vehicle. The application store contains, in one configuration, a plurality of applications for installation on an on board computer of the vehicle, with the applications provided to the vehicle operator being provided to the operator being based on predetermined types of information related to the vehicle, its state, operation, and/or configuration, vehicle location, vehicle type, make, model, and/or year of manufacture, and/or occupant(s) and/or occupant(s) of other vehicles.



TARGET ARCHITECTURE DETERMINATION

Thu, 20 Oct 2016 08:00:00 EDT

Examples of the present disclosure provide apparatuses and methods for target architecture determination. An example method comprises receiving an indication of a type of target architecture in a portion of source code and creating compiled code for the type of target architecture based on the indication.



CODE ROUTINE PERFORMANCE PREDICTION USING TEST RESULTS FROM CODE INTEGRATION TOOL

Thu, 20 Oct 2016 08:00:00 EDT

Example embodiments relate to code routine performance prediction using test results from code integration tool. An example system may include a code integrator to merge multiple developer committed copies of code for an application and automatically run tests on the merged code. The code integrator may gather performance information of a pre-written code routine included in the merged code, where the performance information is generated in response to the tests. The system may include a code routine performance manager to receive and store the performance information of the pre-written code routine. The system may include a code development environment to allow a developer of the application to create and modify a working copy of code for the application. The code development environment may receive the performance information of the pre-written code routine when the pre-written code routine is included in the working copy of the code.



DETERMINING ERRORS AND WARNINGS CORRESPONDING TO A SOURCE CODE REVISION

Thu, 20 Oct 2016 08:00:00 EDT

The method of tracking errors and warnings of a revision of source code includes a computer processor that receives a first and second revision of source code. The computer processor determines a first set of errors and warnings included in the first revision of the source code and a second set of errors and warnings included in the second revision of the source code. The computer processor identifies a third set of errors and warnings that appear in the first revision of the source code, and absent in the second revision of the source code, and the computer processor identifies a fourth set of errors and warnings that are absent in the first revision of the source code and that appear in the second revision of the source code.