Entries |
Document | Title | Date |
20080216055 | PROACTIVE PERFORMANCE MANAGEMENT FOR MULTI-USER ENTERPRISE SOFTWARE SYSTEMS - The invention provides, in some aspects, systems for proactive management of development and performance of a software application based on monitoring it (and/or one or more of its components) during the course of development or execution. Those systems signal alerts upon determining that actual or expected usage of the application (or its components) by users of like classes (or roles) is anticipated to, or does, exceed quotas, when the application is placed in production mode. | 09-04-2008 |
20080216056 | Fully integrated software change request system which includes but not limited to the following modules: change request, migration request, work flow engine project, collaboration, code movement, document tracking, code execution, status notification and database schema snapshot as well as various reporting capabilities. - A fully integrated Information Technology Software Development Life Cycle (SDLC) request management system comprising of a centralized database and a web interface which includes but not limited to the following modules: Change Request, Migration Request, Work Flow Engine, Project, Collaboration, Code Movement, Document Tracking, Code Execution, Status Notification and Database Schema Snapshot as well as various reporting capabilities are disclosed. | 09-04-2008 |
20080216057 | RECORDING MEDIUM STORING MONITORING PROGRAM, MONITORING METHOD, AND MONITORING SYSTEM - A recording medium readable by an information processing apparatus, has recorded thereon a monitoring program for monitoring an operation status of a monitoring target program that runs on an information processing apparatus having a processor and a memory. The monitoring program causes the information processing apparatus to obtain, at a time of installation of a program, information indicating a status where the program is executed in the information processing apparatus and becomes a monitoring target program. The program monitors, on the basis of the information obtained, whether the monitoring target program exists in a memory in which the monitoring target program has been loaded. | 09-04-2008 |
20080222612 | EMBEDDED SYSTEMS DEBUGGING - The invention relates to a data processing system comprising a central processing unit, a first memory coupled to the central processing unit for storing variable data values, an eventing engine coupled to the central processing unit and the memory to monitor in real-time at least one of the variable data values and determine the occurrence of an event based on the at least one of the variable data values, and a debug module coupled to the central processing unit and to the eventing engine for receiving the at least one of the variable data values in real time to conduct a real-time debugging of the program. | 09-11-2008 |
20080229288 | Software Plugin Modules for Device Testing - Apparatus having corresponding methods and computer-readable media comprise: one or more plugins each adapted to execute on the computer, wherein each plugin comprises a monitor module adapted to monitor data exchanged between one or more applications executing on the computer and a respective device driver executing on the computer, and a capture module adapted to capture the data. | 09-18-2008 |
20080244526 | DYNAMIC LEARNING IN REDESIGNING A COMPOSITION OF WEB SERVICES - Business processes are constructed and/or modified utilizing system knowledge including a folksonomy that stores information regarding a group of services usable by composition applications that collects system monitored services usage information and user inputs. In one aspect, candidate services are recommended and/or automatically updated/replaced, which can implement aspects of a business process from the group of services based upon information derived from the system knowledge. In another aspect, a composition design component interacts with a user to build and/or modify services based upon identified aspect of business processes to be implemented by services, wherein the component design component recommends candidate services that can implement the aspects of the business processes from the group of services based upon information derived from the system knowledge. | 10-02-2008 |
20080244527 | TOOLING FOR IMPLEMENTING BUSINESS PROCESSES USING WEB SERVICES - Business processes are implemented using a collection component for storing system knowledge comprising usage history and user input relative to activities within community of users, where the system knowledge comprises at least a folksonomy. At least one of a user client component interacts with the data collection component to enable a corresponding user to contribute user-derived information to the folksonomy and a monitoring component monitors activities associated with the community of users and interacts with the data collection component to contribute usage information to the system knowledge. Still further, a composition design application interacts with a user to build and/or modify processes built using services, wherein the composition design application recommends candidate services that can implement aspects of the business processes based upon information derived from the system knowledge. | 10-02-2008 |
20080244528 | Auto-Generation Of Provider Functionality - Described are systems and methods for implementing auto-generation of provider functionality. An approach is discussed regarding exposing a management surface of an application by using a system of informational tagging on existing code in the application. The informational tagging can include a set of classification techniques using attribution. | 10-02-2008 |
20080244529 | PROFILE NORMALIZATION IN AN AUTONOMIC SOFTWARE SYSTEM - There is provided an autonomic software system and method for normalizing a profile collected for an executing application to account for one or more actions applied to the executing application after the profile was collected, comprising: predicting an impact of applying the one or more actions to the executing application by utilizing the profile and the one or more actions; and adjusting the profile to form a normalized profile according to the predicted impact. A plurality of different a profile consumers, such as, a phase shift detector, an action evaluator as well as a normalizing controller, may utilize the normalized profile to improve the behavior of the executing application. In addition, online visualization tools may be implemented to graphically depict the normalized profiles, as well as differences between the collected profiles and the normalized profiles. | 10-02-2008 |
20080256518 | Source Code Checker, Source Code Checking Method, Program for Causing Execution of the Method, and Storage Medium for Storing the Program - Disclosure is made of a source code checker and a source code checking method, for checking properties related to program behaviors meant by source code for a computer program; of a program for making execute the method; and of a storage medium for storing the program. This source code checking method includes a path extracting step and a checking information determining step. The path extracting step simulates a program described in source code for a computer program preliminarily input, to extract an instruction series to be actually executed. The checking information determining step determines checking information of the source code according to the instruction series extracted in the path extracting step. | 10-16-2008 |
20080263524 | Method and System for State Machine Translation - A state machine program is generated from a state machine. The state machine has states, transitions and events. A basic structure for the state machine program is generated. The basic structure has therein a structure that operates in non-final states. A statement is generated within the structure for detecting an event. A statement is generated within the structure for evaluating the detected event based on a current state to identify if the current state is valid for the detected event. A statement is generated within the structure for determining a next state if the current state is valid. A statement is generated within the structure for transitioning the current state to the next state. | 10-23-2008 |
20080270992 | METHOD AND SYSTEM FOR TESTING APPLICATION MODULES USING STATIC TESTS FROM A TEST SUITE - A method and a system for validating a plurality of files via static tests from a test suite are described. The method includes selecting a plurality of static tests from a test suite, executing the plurality of static tests on a plurality of files to validate the plurality of files, and storing records after executing the plurality of static tests to record the validation of the plurality of files. The system includes an application, a plurality of files inside the application, the plurality of files to describe and configure the application, a plurality of static tests to validate the plurality of files, and a framework to apply the plurality of static tests to the plurality of files. | 10-30-2008 |
20080270993 | Computer program testing after source code modification using execution conditions - Computer program testing after source code for the computer program has been modified is performed more quickly, by using execution conditions. First, second, and third execution conditions are determined. These execution conditions are used to perform testing of the program to determine whether the program is properly functioning. Particularly, test data on which basis testing of the computer program is performed can be classified as first test data, second test data, third test data, or fourth test data. The program prior to modification of the source code is tested by employing the first, second, and third test data. After the source code is modified, the program is retested by employing only the third and the fourth test data. The program is thus properly retested after source code modification by employing only the third and the fourth test data, without having to employ the first and the second test data. | 10-30-2008 |
20080276225 | Testing Executable Logic - A computer-implemented method for performing testing on executable logic includes providing, in a test framework, an instance of at least one object that is associated with an object-processing framework. The test framework has at least one interface that is common with the object-processing framework. The method includes calling a logic portion that is to be tested, the logic portion being called with at least one test parameter received from a user. The method includes recording a result of an operation that is performed as the logic portion causes the at least one object in the test framework to be accessed using the at least one interface. Also a related computer program product and graphical user interface. | 11-06-2008 |
20080282231 | AUTOMATED SOFTWARE TESTING FRAMEWORK USING INDEPENDENT TEST SCRIPTS - A software testing framework for testing independent scenarios of software applications can comprise independent test scripts, business rules repositories, and test data sources. Independent test scripts can be used to test screens of the software application. Business rules repositories can be stored separately from independent test scripts and from test data sources. A framework for testing end-to-end scenarios of software applications can comprise modules, business rules repositories, and test data sources. An end-to-end scenario can be tested by executing two or more independent test scripts. Independent scenarios can be tested using a framework by populating fields, determining expected and actual results, and comparing the expected and actual results. End-to-end scenarios can be tested by executing independent test scripts associated with independent scenarios of the end-to-end scenario. Software testing can be performed without using test cases. | 11-13-2008 |
20080282232 | Iterative, Non-Uniform Profiling Method for Automatically Refining Performance Bottleneck Regions in Scientific Code - A method for profiling performance of a system includes steps of: monitoring execution of the system at multiple points during the system's operation; analyzing results derived from the monitoring in order to provide analyzed results; reconfiguring the monitoring non-uniformly according to the analyzed results; and repeatedly performing iterations of the above steps until a particular event occurs. The iterations may be terminated upon: reaching a specified level of analysis precision, determining a source of one or more performance bottlenecks, determining a source of unexpectedly high output or low completion time, completing a predefined number of iterations, reaching an endpoint of an application, or having performed iterations for a specified period of time. | 11-13-2008 |
20080282233 | RAPID APPLICATION INNOVATION UTILIZING AN ORTHOGONAL PROGRAMMING COMPONENT - Embodiments are provided to utilize an orthogonal or independent programming component to rapidly develop new features for use in computer application programs through the testing of new application program concepts on a server. In one embodiment, the orthogonal programming component intercepts a request to access an application program stored on the server and, if the request meets certain predefined criteria, sends the request to a treatment component to implement the new application concepts without changes having to be made to the application program stored on the server. | 11-13-2008 |
20080288924 | Remotely Handling Exceptions Through STAF - An apparatus for communicating between a child test program and a parent test program in a test environment. A child test framework is provided to catch an exception thrown by the child test program. In addition, a marshalling component is provided in communication with the child test program and the child test framework. The marshalling component converts exception data for the exception into a format for transmission by a communication means to a parent test framework. | 11-20-2008 |
20080295080 | Program Maintenance Support Device, Program Maintenance Supporting Method, and Program for the Same - The present invention includes program storing unit | 11-27-2008 |
20080301646 | Detecting Dangling Pointers and Memory Leaks Within Software - Dangling pointers and memory leak locations within software are detected. As the software allocates and deallocates memory, lists of pointers referencing the memory, and pointer status, are maintained. As the software writes new addresses within pointers and reads addresses referenced by the pointers, the pointer lists are maintained to determine whether the pointers are dangling and to detect memory leak locations. A balanced binary tree having a number of nodes can be maintained. The nodes represent heap or stack records. Each heap record corresponds to heap memory that has been allocated and has a list of pointers referencing the heap memory. Each stack record corresponds to a stack within which a stack frame is allocated each time a function is entered. The stack record has frame records corresponding to the stack frames. Each frame record has a list of pointers referencing the corresponding stack frame. | 12-04-2008 |
20080301647 | Delivering Malformed Data for Fuzz Testing to Software Applications - Systems and methods to deliver malformed data for software application fuzzing are described. In one aspect, a fuzzing engine receives well-formed valid input data from a test automation tool. The received data is for input into a software application to implement a functional test. Responsive to receiving the well-formed valid input data, the fuzzing engine automatically generates corresponding malformed data based on characteristics of the well-formed valid input data. The application is then automatically fuzzed with the malformed data to notify an end-user of any security vulnerabilities in one or more code paths of the application used to process the malformed data. | 12-04-2008 |
20080313616 | METHODS AND SYSTEMS FOR TESTING TOOL WITH COMPARATIVE TESTING - Embodiments of the present invention provide a multi-input comparative testing tool. The present invention looks at the internal structure of the software being tested and compares the two pairs of internal structures. In the present invention, the testing tool is capable of receiving multiple program code files or data files as its input. For each program code file, the testing tool generates a collection of problem objects and compares pairs of the problem collections with each other. The present invention may also run on data files having program code. For example, the present invention is capable of testing extensible markup language (XML) files to determine if they validate against a schema. Problem objects that are in both collections are identified and set aside. The remaining problem objects are then marked either as being resolved or new depending in which collection they exist. | 12-18-2008 |
20080313617 | Analyzing software users with instrumentation data and user group modeling and analysis - Described is a technology by which software instrumentation data collected from user program sessions are analyzed, including by determining program usage metrics and/or command usage metrics. Information representative of the program usage metrics and/or the command usage metrics is output, such as in the form of a report. The software instrumentation data may be further analyzed, such as to determine at least one usage trend over time, and to determine user groups. For example, a usage subset of sessions that meet specified session usage criteria based on a set of session data may be located, along with a subset of users based on users whose sessions meet specified user criteria. The usage and user subsets may be combined via Boolean logic to produce a result set. | 12-18-2008 |
20080320449 | DETECTING MEMORY LEAKS - Methods of detecting a memory leak may include identifying a largest ChildNode of a ParentNode, and comparing a total size of the ParentNode to a total size of the largest ChildNode of the ParentNode. If the total size of the ParentNode is significantly larger than the total size of the largest ChildNode of the ParentNode, a possible memory leak area may be identified. Related systems and computer program products are also discussed. | 12-25-2008 |
20090013311 | REMOTE MONITORING AND DIAGNOSTIC SYTEM - A center-side processing system and monitoring processing systems of monitoring objects are connected through a network. The center-side processing system includes a module for producing monitoring and diagnostic algorithms of the monitoring objects, software producing module for producing monitoring and diagnostic software from the monitoring and diagnostic algorithm, a module for producing a transmission schedule of the monitoring and diagnostic software, transmitting module for transmitting software according to the transmission schedule, a module for correcting and changing the monitoring and diagnostic software from data received from the monitoring processing system, and verification module for performing verification before the transmission of the monitoring and diagnostic software. Each of the monitoring processing systems includes a module for receiving the monitoring and diagnostic software, execution processing module for executing the monitoring and diagnostic software, a module for automatically verifying the monitoring and diagnostic software, and transmitting module. | 01-08-2009 |
20090044174 | DYNAMIC DETECTION OF ATOMIC-SET-SERIALIZABILITY VIOLATIONS - A method, an information processing system, and a computer readable medium, are used to detect atomic-set serializability violations in an execution of a program. A set of classes associated with a program to be analyzed is identified. The set of classes include a set of fields. At least one subset of fields in the set of fields in the identified classes is selected. A set of code fragments associated with an execution of the program is selected. Data accesses in the selected set of code fragments are observed. It is determined if the selected set of code fragments is serializable for each selected subset of fields. | 02-12-2009 |
20090044175 | REAL-TIME WATCH DEVICE AND METHOD - The real-time watch device for displaying a value in a memory used by a target system during execution of a program in the target system, includes: a watch information acquisition section for acquiring registered watch information; a memory access section for reading a value stored at a received memory address from the memory; a memory accessibility determination section for determining whether or not a memory address to be referred to given in the acquired watch information is accessible; and a watch display section for outputting a memory address determined accessible by the memory accessibility determination section to the memory access section and displaying a value read by the memory access section. | 02-12-2009 |
20090049427 | METHOD TO RECOGNIZE GUI OBJECT IN GLOBALIZED ENVIRONMENT - A method and apparatus for identifying GUI widgets of software are provided, comprising: during runtime of the software, determining a GUI window object and an ID thereof, determining all GUI widgets or all GUI widgets belonging to a same type in the GUI window object; partitioning the display area of the GUI window object into a plurality of areas such that each of the GUI widgets is uniquely contained in one area; specifying a unique ID for each area containing a GUI widget; and, identifying a GUI widget using the ID of the GUI window object and the ID of the area where the GUI widget resides, or the ID of the GUI window object, the ID of the type to which the GUI widget belongs and the ID of the area where the GUI widget resides, as the ID property of the GUI widget. | 02-19-2009 |
20090077541 | METHOD AND APPARATUS FOR TESTING AND MONITORING SYSTEMS USING RECONFIGURABLE HARDWARE AND SOFTWARE RESOURCES - According to a first embodiment of the present invention, reconfigurable resources within a reconfigurable test unit are configured to test or monitor a first function associated with a system under test. Following the completion of the testing or monitoring of the first function, the reconfigurable resources within the reconfigurable test unit are configured to test or monitor a second function associated with the system under test, wherein the second function may be substantially different than the first function. The method and apparatus so described allows for the testing of systems using a minimal amount of hardware and software resources within a reconfigurable test unit. | 03-19-2009 |
20090083713 | Method of adjusting timing difference between pre-corrected source program and post-corrected source program, compiler and information processor - A method of adjusting a control timing accompanying a program correction of a machine language program executed by an information processor includes preparing a first machine language program obtained by compiling a first source program and generating a second intermediate language program from a second source program, the second source program being corrected from the first source program. Then, the method computes a first number of clock cycles, that is a number of clock cycles to execute a first machine language program obtained by compiling the first source program and computes a second number of clock cycles, that is a number of clock cycles to execute a second machine language program obtained by compiling the second source program, using the second intermediate language program, the second intermediate language program including an instruction that is uniquely correlated with a machine language instruction of the second machine language program. Then, the second number of clock cycles with the first number of clock cycles are compared and the second machine language program is adjusted by performing at least one of addition, deletion and modification of the second machine language program to reduce a difference between the first number of clock cycles and second number of clock cycles, based on the second intermediate language program. | 03-26-2009 |
20090094582 | CHECKPOINT AND RESTARTABLE APPLICATIONS AND SYSTEM SERVICES - A computer implemented method, apparatus, and computer program product for checkpoint and restart of a process. In one embodiment, a process shell representing a restartable process is created on an arrival server in response to identifying a process on a departure server that is a restartable process. The process shell is frozen. A name of the restartable process, an identifier of the restartable process, and an identifier of a parent process of the restartable process is assigned to the process shell. The process shell is then unfrozen and exits. A parent process restarts the restartable process when the process shell exits. | 04-09-2009 |
20090100414 | Method and Apparatus for Autonomic Test Case Feedback Using Hardware Assistance for Code Coverage - A method, apparatus, and computer instructions for presenting coverage data for code. The coverage data containing instruction access indicators associated with the code is obtained. Particular instruction access indicators that have been set by a processor in the data processing system in response to execution of the code by the processor are identified to form set instruction access indicators. Each set instruction access indicator is associated with a portion of the code. A presentation for the coverage data is generated. The set instruction access indicators are identified in the presentation. This presentation may be, for example, a graphical presentation. | 04-16-2009 |
20090106738 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR REAL TIME CONFIGURATION AND ANALYSIS OF NETWORK BASED ALGORITHMIC SERVICE OBJECTIVES - A network based algorithmic Service Objective (SO) is evaluated by defining an SO script comprising a plurality of Service Indicators (SIs), each of the SIs comprising an equation including a plurality of operands and at least one operator, instantiating the SO script into an object-oriented representation of the SO, obtaining values for each of the plurality of operands, and computing each of the SI equations using the obtained values. | 04-23-2009 |
20090106739 | SYSTEMS AND METHODS FOR DEBUGGING MULTIPLE WORKFLOW INSTANCES - Systems and methods for remotely monitoring and debugging processes over a distributed network are provided. In one aspect, a method includes attaching to a first process of a plurality of processes running on a remote device such that a second process of the plurality of processes is not interrupted, and displaying details of the first process at a client. | 04-23-2009 |
20090106740 | Replay of program executions using cross-entropy - A method for replay of program executions using cross-entropy is provided. The method comprises identifying a first sequence of decision points, wherein the first sequence represents a first execution of a logic code; identifying a second sequence of decision points, wherein the second sequence represents a second execution of the logic code; computing a distance between the first and second executions; and minimizing the distance between the first and second executions using cross-entropy, in response to determining that the second execution is not within a predetermined threshold distance of the first execution. | 04-23-2009 |
20090113396 | Monitoring asset state to enable partial build - When an up to date state has been achieved for the inputs and outputs of a build process, an asset state indicator is set to indicate that all the inputs and outputs are up to date. Those inputs and outputs are monitored. If a change to any of the inputs and/or outputs is detected, the asset state indicator is updated to indicate that some build execution is needed. When a build request is detected, the current state of the asset state indicator is exposed. An execution sequence for targets of the build process based on dependencies between targets is determined. A starting point for a partial build is determined by determining the earliest-appearing target in the sequence that is affected by the detected changes to the inputs and outputs to the targets of the execution sequence. Executing the build process from this starting point will produce the updated outputs and return the system to the up to date state. | 04-30-2009 |
20090113397 | Dynamic, secure software tagging for software asset management with respect to deployment, configuration, and usage - A software tagging application is configured to measure software application usage within an enterprise deployment. The software tagging application using the concepts of tags, and extends the use of tags to convey monitored software usage. This usage data is written to the tag and secured with a signature calculated using public/private key cryptography. The signature ensures that the usage data collected is correct and has not been tampered with. Usage data refers to both the number of client versions of the software and specific software features installed, and any type of metric for monitoring real usage of the specific software features, for example the number of minutes used, and the start and stop times that the feature was executed. Monitoring usage in this manner provides a dynamic usage model that tracks current and historical software usage, from an enterprise-wide level down to a specific user and feature level. | 04-30-2009 |
20090133001 | METHOD AND SYSTEM FOR ASSESSING VIRTUALIZATION CAPABILITY OF A SOFTWARE APPLICATION - A method for assessing virtualization capability of a software application involves monitoring execution of the software application to obtain performance data associated with the software application, analyzing the performance data to determine whether the software application satisfies virtualization requirements, and generating a virtualization score indicating virtualization capability of the software application based on the analyzing. | 05-21-2009 |
20090133002 | Method for benchmarking online business environments - A method to create web 2.0 index for an online business environment includes listing web 2.0 parameters, assigning a value based score to the listed web 2.0 parameters against each online business environment and computing the web 2.0 index for each online business environment. The method can create a benchmark between online business environments based on indicative of the computed web 2.0 indices. The web 2.0 index for an online business environment is the calculated by aggregating the value based scores assigned to individual web 2.0 parameters. The list of web 2.0 parameters for an online business environment captures content index constituents, collaboration index constituents and commerce index constituents. | 05-21-2009 |
20090164975 | FUZZING ENCODED DATA - A test tool is provided for testing a software component. The tool receives data structured and formatted for processing by the software component. The structured data might conform to a schema defining valid inputs that the software component is able to parse/process. The test tool selects a discrete part of the structured data and fuzzes the selected discrete part. The test tool determines whether there are any parts of the structured data whose validity can be affected by fuzzing of the discrete part of the structured data. The fuzzed discrete part of the structured data is analyzed and a related part of the structured data is updated to be consistent with the fuzzed discrete part. The fuzzing tool passes the structured data with the fuzzed part and the updated part to the software component being tested. The software component is tested by having it process the data. | 06-25-2009 |
20090164976 | MULTI-THREADED DEBUGGER SUPPORT - A method and information processing system facilitate debugging of a multi-threaded application. A control program request associated with at least one thread of a process that has been designated for debugging is generated. The control program request is placed into a memory buffer associated with the thread by the debugger. The memory buffer is passed to a control program. A plurality of memory buffers is monitored. Each memory buffer in the plurality of memory buffers is associated with a different thread of the process. At least one memory buffer in the plurality of memory buffers is determined to include debugging event information from the control program determining. The debugging event information is processed. The processing includes at least one of notifying a user of the debugging event information and generating at least one control program request for a thread associated with the at least one memory buffer. | 06-25-2009 |
20090164977 | EXTENSIBLE AND UNOBTRUSIVE SCRIPT PERFORMANCE MONITORING AND MEASUREMENT - A method, system and apparatus for the extensible and unobtrusive performance monitoring and measurement for scripts executing through a script engine. A script performance monitoring and measurement system can include a script engine programmed to execute a provided script and a script processor configured to provide a script to the script engine for execution. Importantly, the system can include a performance monitor disposed between the script processor and the script engine. | 06-25-2009 |
20090187893 | COORDINATING CHORES IN A MULTIPROCESSING ENVIRONMENT - The coordination and execution of chores in a multiprocessing environment. The coordination of chores is accomplished utilizing a compiler generated correlation that relates blocks of code that execute chores and blocks of code in which the chore can be realized. By tracking the execution of the program and using the compiler-generated correlation, chores can be identified for the currently executing code. | 07-23-2009 |
20090187894 | METHOD, APPARATUS OR SOFTWARE FOR IDENTIFYING DEPENDENCIES BETWEEN COMPONENTS FOR A GIVEN BUILD OF A COMPONENTISED PRODUCT - A method, apparatus and software is disclosed for identifying dependencies between components for a given build of a componentised product in which the results of testing of combinations of existing and new components that comprise the product are used to identify dependencies between new components. | 07-23-2009 |
20090204948 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR DETECTING THREAD STARVATION - Thread starvation is indicated for a program under test while the program is running. Beginning with a least frequently used thread in a list of thread tracking structures, if recorded events are currently listed for the thread, thread starvation is detected based on a percentage of the recorded events that took place while other threads were waiting a synchronization object held by the thread. If no recorded events are listed for the thread, the percentage of recorded of events that take place while other threads were waiting for synchronization object held by the thread does not exceed the predetermined percentage, and there are timestamps currently listed for the thread and the thread is currently waiting for a synchronization object, thread starvation is detected based on a percentage of time the thread has been waiting for the synchronization object. Thread starvation detection is repeated for each of the remaining threads in the list of thread tracking structure, beginning with the next to least frequently active thread. | 08-13-2009 |
20090222795 | Debugger for a Declarative Event-Driven Programming Model - A compiler generates code providing an execution sequence, from a declarative event-driven model, for execution by a computer. To assist in debugging the declarative event-driven model, the compiler also generates cross-references that relate steps in the generated code to elements of the declarative source code. The cross-references may be used as input to a debugger, along with the declarative source and the generated code, to assist a user who is stepping through the generated code (for example) in understanding which portion of the declarative source gave rise to the current step in the generated execution sequence. | 09-03-2009 |
20090241094 | Execution of Program Code Having Language-Level Integration of Program Models - To enable language-level integration of multiple programming languages into a single programming framework, one or more domain specific languages (DSLs) are specified as incremental extensions to a host programming language. An application created in this framework may include program code written in the host language as well as DSL inset code that is written in any of the DSLs. The extensions to the host language are described in DSL specifications, which define how the DSL inset code is processed. At runtime, DSL inset code in the source code is detected and passed to a DSL inset processor for execution according to an appropriate DSL specification, whereas source code in the host language is executed by a host language processor. | 09-24-2009 |
20090249300 | EVENT SET RECORDING - Recording of functional steps resulting from actions in an application is desirable for performing functional testing or user interface automation of an application. However, certain events that may result from actions occurring in an application are often difficult to record, which may lead to playback failure. Further, a user's intent when performing an action is difficult to determine. In order to obtain effective playback, a reliable and efficient recording of an application's functional steps needs to occur. Injecting wrapper functions into an application and monitoring an event generator's state before and after an action has occurred may yield more reliable and effective results. | 10-01-2009 |
20090249301 | Method and Apparatus for Testing Soft Error Rate of an Application Program - Techniques are provided for determining consequences of an injected fault on a system running a given application program or operating system, in order to measure the software impact of a hardware soft error on the application program/operating system. The application program software is emulated instruction-by-instruction, where source operands are randomly modified before an instruction is executed, and destination operands are randomly modified after an instruction is executed, in order to mimic hardware soft errors. In addition, a program counter is randomly modified after execution of a branch instruction. The resulting consequences of such modifications are monitored such that a fault of an instruction being executed is modeled in order to determine a soft error rate (SER) for a software application program or operating system. | 10-01-2009 |
20090259993 | Sandbox Support for Metadata in Running Applications - Techniques for using a sandbox to test changes to the metadata of a metadata-driven application. In one set of embodiments, a mainline and a sandbox are created in a runtime environment of a metadata-driven application. The mainline is configured to include a mainline version of a metadata document of the application. The sandbox is configured to include a sandbox (i.e., test) version of the metadata document. At application runtime, requests to access and/or modify the metadata document are serviced either from the mainline or the sandbox based on a sandbox context of the current user session. Thus, changes to the metadata document may be tested on the sandbox version without affecting the mainline version, and vice versa. In various embodiments, multiple sandboxes may be supported in the runtime environment. In further embodiments, the sandbox version may be merged into the mainline version without bringing the runtime environment offline. | 10-15-2009 |
20090259994 | Apparatus, Method, and Computer Program Product for Analyzing Program Memory Operations - In accordance with an example embodiment of the present invention, an apparatus, comprising a memory; and a processor configured to monitor operations of at least one program related to the memory and analyze memory operations of the at least one program based at least in part on the monitoring is disclosed. | 10-15-2009 |
20090265691 | GRANULAR MEASUREMENT OF PROCESSOR PERFORMANCE IN EXECUTING SECTIONS OF SOFTWARE CODE - Processor performance in executing a section of software code is measured. A clock associated with the section of software code. It is detected that the section of software code is beginning to be executed. In response, the clock associated with the section of software code is started. It is then detected that the section of software code is no longer being executed. In response, the clock associated with the section of software code is stopped. The clock is stopped and restarted as the section of software code temporarily stops execution to cede control to other sections of software code. Ultimately, a value of the clock associated with the section of software code is output, where the value corresponds to the processor performance in executing the section of software code. | 10-22-2009 |
20090276760 | INSTRUMENTATION OF MIDP APPLICATIONS FOR ONE-DEVICE TESTING - A method for testing a MIDlet application with a test application includes a step of modifying the MIDlet application to form a modified MIDlet application which allows the test application to access one or more functions, variables, or classes from the MIDlet application. The MIDlet application is then bundled with the test application to form a testable MIDlet application. The testable MIDlet application is executed on a MIDlet capable device or a MIDlet-capable device emulator and test results are collected. A system executing the method is also provided. | 11-05-2009 |
20090276761 | WEIGHTED PERFORMANCE METRICS FOR FINANCIAL SOFTWARE - Embodiments of a computer system that determines a performance metric are described. During operation, the computer system determines the performance metric for tasks performed by financial software during a time interval. This performance metric is based on a weighted summation of contributions from the tasks, and a given weight associated with a given task is based on a frequency of occurrence of the given task. Then, the computer system performs a remedial action to improve the determined performance metric during a subsequent time interval. | 11-05-2009 |
20090276762 | Method for the computer-assisted optimization of the resource utilization of a program - In accordance with 37 C.F.R. ยง1.125, a substitute specification has been included in lieu of substitute paragraphs in connection with the present Preliminary Amendment. The substitute specification is submitted in clean form, attached hereto, and is accompanied by a marked-up version showing the changes made to the original specification. The changes have been made in an effort to place the specification in better form for U.S. practice. No new matter has been added by these changes to the specification. Further, the substitute specification includes paragraph numbers to facilitate amendment practice as requested by the U.S. Patent and Trademark Office. | 11-05-2009 |
20090282390 | Parallel Run-Time Rendering Debugger - Systems and methods are disclosed for debugging the graphical output of a software program. This may be achieved both by displaying the graphical output of the software program at intermediary stages of the graphical rendering process, and by visually representing the interdependencies found within the software code of the program. | 11-12-2009 |
20090300587 | DETERMINING DOMAIN DATA COVERAGE IN TESTING DATABASE APPLICATIONS - Testing systems and methods are provided for determining domain data coverage of a test of a codebase. The testing system may include a coverage program having a setup module configured to receive user input indicative of a target domain data table to be monitored during the test. The coverage program may further include a test module configured to programmatically generate a shadow table configured to receive coverage data, and to create one or more triggers on the target domain data table. The triggers may be configured, upon firing, to make entries of coverage data in the shadow table indicating that the trigger was fired during the test. The coverage program may also include an output module configured to compare the shadow table and the target domain data table to produce a coverage result, and to display the coverage result via a graphical user interface. | 12-03-2009 |
20090313609 | SYSTEM AND METHOD OF IDENTIFYING AND TRACKING SOFTWARE PATTERN METRICS - This disclosure relates to software patterns, and more particularly, to the tracking of software pattern metrics. A system or method may query a software environment to determine the type of use of, and identify, at least one software pattern. The system or method may also collect at least one software pattern metric, and determine the impact of the at least one software pattern within an environment. The system or method may also store software pattern information and recall software pattern information. | 12-17-2009 |
20100005454 | PROGRAM VERIFICATION THROUGH SYMBOLIC ENUMERATION OF CONTROL PATH PROGRAMS - Systems and methods are disclosed to verify a program by symbolically enumerating path programs; verifying each path program to determine if the path program is correct or leads to a violation of a correctness property; determining a conflict set from the path program if the path program is proved correct; using the conflict set to avoid enumerating other related path programs that are also correct. | 01-07-2010 |
20100023930 | SOFTWARE TOOL FOR SCENARIO-BASED CODE INSPECTIONS - A computer program product for scenario-based source code inspection is provided. The computer program product comprises a computer-usable data carrier storing instructions that, when executed by a computer, cause the computer to display a plurality of functions, the plurality of functions comprising: a first function for creating one or more scenario paths in the source code by providing the ability to create hyperlinks from subroutine/macro calls to the subroutine or macro source in the code and commentary addition; and a second function for inspecting code in execution order and inspecting uninspected lines of code by providing the ability to annotate the code with any errors and observations found and mark lines inspected. | 01-28-2010 |
20100042976 | OPTIMIZING APPLICATIONS USING SOURCE CODE PATTERNS AND PERFORMANCE ANALYSIS - Methods, systems, and apparatus, including medium-encoded computer program products, can perform optimizing applications using source code patterns and performance analysis. A computer implemented method includes storing patterns of inefficiently coded statements; identifying source code comprising program statements; comparing the program statements with the patterns to identify program statements that are inefficiently coded; monitoring an execution of a compiled version of the source code to identify program statements that cause performance issues; and comparing the identified program statements that are inefficiently coded with the identified program statements that cause performance issues to determine program statements that are inefficiently coded and cause performance issues. | 02-18-2010 |
20100070950 | APPARATUS AND METHODS FOR WORKFLOW CAPTURE AND DISPLAY - The apparatus for workflow capture and display is provided with a plurality of modules configured to functionally execute the necessary steps of capturing task workflow information, storing the task workflow information captured by the capture module in a data storage device, retrieving a portion of the task workflow information from the data storage device in response to a first event, and presenting the task workflow information in response to a second event. These modules in the described embodiments include a capture module, a storage module, an assembly module, and a presentation module. | 03-18-2010 |
20100077384 | PARALLEL PROCESSING OF AN EXPRESSION - A method includes compiling an expression into executable code that is configured to create a data structure that represents the expression. The expression includes a plurality of sub-expressions. The code is executed to create the data structure. The data structure is evaluated using a plurality of concurrent threads, thereby processing the expression in a parallel manner. | 03-25-2010 |
20100083234 | METHOD AND APPARATUS FOR EFFICIENT STATISTICAL PROFILING OF VIDEO GAME AND SIMULATION SOFTWARE - Efficient statistical profiling in embedded computing devices, such as video games, uses a hybrid random distribution of sampling points for more accurate reconstruction of executing code. Transmission of only function start addresses and corresponding representation of the call graph data reduces the memory overhead and increases communication speed. | 04-01-2010 |
20100083235 | DEBUG SYSTEM FOR DIAGRAM OF PROGRAMMABLE CONTROLLER, ITS PROGRAMMING DEVICE AND ITS PROGRAM - A debug system is provided with a control program compilation processing unit | 04-01-2010 |
20100095277 | METHOD FOR SOURCE-RELATED RISK DETECTION AND ALERT GENERATION - A method and system for detecting a source-related risk and generating an alert concerning the source-related risk are disclosed. Criteria of the source-related risk are defined. Thresholds associated with the source-related risk are defined. Every operation on an object is detected. If an operation on an object satisfies a criterion among the criteria or if the operation causes to exceed a threshold among the thresholds, an alert is generated for the operation. | 04-15-2010 |
20100131930 | Selective Code Coverage Instrumentation - Reporting on software test coverage, where a set of coverage tasks and a coverage task hierarchy have been established for a software under test (SUT). Establishing a coverage task subset, the subset including at least one coverage task hierarchy element at a level above the lowest coverage task hierarchy level. Identifying when, during a software test, a coverage task in the coverage task subset was completed. Outputting to a user the identity of those portions of the coverage task that have been completed. Refining the coverage task subset in one of the following fashions through the coverage task hierarchy in accordance with user input: depth first progression, breadth first progression. | 05-27-2010 |
20100153925 | Systems and methods for enhanced profiling of computer applications - Systems, methods, and computer-readable media are disclosed for enhanced profiling. An exemplary method includes initiating an execution of a software application which includes a plurality of routines, storing information related to data inputs to the plurality of routines during the execution of the software application, storing resource consumption information for the plurality of routines during the execution of the software application, correlating the resource consumption information for the plurality of routines to a size of the data inputs, and analyzing the correlated resource consumption information to determine a subset of the plurality of routines that exhibit at least a threshold amount of resource consumption with increasing size of the data inputs. | 06-17-2010 |
20100153926 | OPERATING SYSTEM AIDED CODE COVERAGE - A method, system, and computer program product for operating system (OS) aided code coverage are provided. The method includes reading context information associated with a software process in response to a context switching event in an OS, the OS initiating the reading of the context information and controlling scheduling of the software process. The method further includes determining coverage information for code implementing the software process as a function of the context information in response to the OS reading the context information, and storing the coverage information as coverage data. | 06-17-2010 |
20100162215 | ENABLING AUTOMATED REAL-TIME METRICS DURING THE SOFTWARE DEVELOPMENT PROCESS - An event triggering an automatic real-time metric evaluation can be identified. A metric can be selected from one or more of metrics associated with the triggering event. Metric input can be collected from at least one source relevant to the selected metric. The collected metric input can be evaluated against one or more rules associated with the selected metric. The evaluation of the metric can be presented in real-time to an appropriate user. Based on the outcome of the evaluated metric, a programmatic action can be performed. | 06-24-2010 |
20100199264 | PATTERN INSPECTION SYSTEM, PATTERN INSPECTION DEVICE, METHOD AND PATTERN INSPECTION PROGRAM - With a program described in an object-oriented language as a target, it is inspected by program analysis whether a pattern of a method call issued to a specific object generated at the time of execution conforms to a given rule of pattern definition or not. | 08-05-2010 |
20100205582 | AUTOMATED MULTI-OPERATING SYSTEM TESTING WITH VIRTUALIZATION - Techniques are provided for testing one or more applications across multiple operating systems (OSs) using virtualization. A device includes a virtualization application and a dispatcher. The virtualization application allows a plurality of guest OSs to execute on a device. The dispatcher is configured to cause a particular file to be stored in a particular location. Each guest OS includes a listener that detects when a file is stored in the particular location. When the listener of each guest OS detects that the particular file is stored in the particular location, the guest OS is configured to perform one or more tasks associated with the particular file. Each guest OS is configured to generate output in response to performing the one or more tasks. The dispatcher is further configured to analyze the output from each of the guest OSs. | 08-12-2010 |
20100205583 | REQUEST-BASED ACTIVATION OF DEBUGGING AND TRACING - Apparatus, systems, and methods for troubleshooting a software service are disclosed that operate to execute the software service on a computing platform to provide a software execution; receive a request at the software service, the request including a client session identifier; identify a troubleshooting point in the software execution based on the client session identifier; and perform a troubleshooting action when the troubleshooting point is detected during the software execution. Additional apparatus, systems, and methods are disclosed. | 08-12-2010 |
20100211935 | METHOD AND APPARATUS FOR ESTABLISHING A QUALITY OF SERVICE MODEL - In general, methods and apparatus for implementing a Quality of Service (QoS) model are disclosed. A Quality of Service (QoS) contract with an initiating network device may be satisfied. A request may be received from the initiating network device in a first time less than or equal to an ordinal number times an arrival interval. The ordinal number signifies a position of the request among a group of requests. The request that has been serviced may be returned to the initiator in a second time less than or equal to a constant term plus the ordinal number times a service interval. | 08-19-2010 |
20100218170 | Method System and Computer Program for Metering Usage of Software Products Based on Real-Time Benchmarking of Processing Power - A solution ( | 08-26-2010 |
20100218171 | COMPUTER BUS MONITORING FOR THE ADAPTIVE CONTROL OF EXECUTING SOFTWARE PROCESSES - A computer executing a software process is monitored by a monitor engine that is coupled to one or more buses in the monitored computer and can be installed in the monitored computer or be separate. Software that is to be monitored is certified, i.e., its nominal โnormalโ operating parameters are determined. Thus, each certified software system running on the monitored computer will have one or more certificates or set points associated with it. An analytical component of the monitoring engine manages the set of certificates for each execution process on the monitored computer. The executing process is monitored by the analytical component and compared against the associated certificate for that process. At any point where the software process begins to diverge from its operational certificate, the analytical component will notify a final control element, or adaptive engine, which can terminate the process or attempt to correct the anomaly. | 08-26-2010 |
20100223597 | AGGREGATION AND PRIORITIZATION OF APPLICATION ISSUE DATA - A novel software application development aid comprises a web portal that provides aggregated and prioritized application issue data to ISVs in an ISV-specific and ISV-customizable manner so that the ISVs may improve their applications or correct errors therein and may know which application issues are causing the greatest reductions in customer satisfaction. So informed, the ISV may efficiently focus limited corrective resources on the most pressing problems. The application issue data sources for the ISV portal may include logo testing data, user crash report data, and other testing data. | 09-02-2010 |
20100229156 | DETECTING PROGRAM PHASES WITH PERIODIC CALL-STACK SAMPLING DURING GARBAGE COLLECTION - A computer readable storage medium for associating a phase with an activation of a computer program that supports garbage collection include: a plurality of stacks, each stack including at least one stack frame that includes an activation count; and a processor with logic for performing steps of: zeroing the activation count whenever the program creates a new stack frame and after garbage collection is performed; determining whether an interval has transpired during program execution; examining each stack frame's content and incrementing the activation count for each frame of the stacks once the interval has transpired; detecting the phase whose activation count is non-zero and associating the phase with the activation; and ensuring that when the phase ends, an action is immediately performed. | 09-09-2010 |
20100242025 | PROCESSING APPARATUS AND METHOD FOR ACQUIRING LOG INFORMATION - A processing apparatus, which contains a processor that executes a program includes a series of instructions, includes a log recording unit configured to record an operation log of the processing apparatus; a managing unit configured to control a recording operation performed by the log recording unit and read the operation log recorded in the log recording unit; an input unit configured to detect, from among the series of instructions of the executed program; a start instruction that starts a process for delivering a control instruction destined for the managing unit to the managing unit and deliver the control instruction to the managing unit in response to the start instruction; and an output unit configured to receive the operation log read by the managing unit. | 09-23-2010 |
20100251218 | DYNAMIC COLLECTION OF INSTRUMENTATION DATA - A flexible system for collecting and reporting instrumentation metrics relating to performance of a software product. Computing devices that execute the software product receive a manifest that specifies the manner in which instrumentation metrics are collected and reported, including what instrumentation metrics are collected. Based on the manifest, an instrumentation metrics client associated with a software product may retrieve instrumentation data from a software product or other sources. The metrics client may then generate one or more instrumentation metrics, based on the instrumentation data, in accordance with instructions in the manifest. The metrics client may then take one or more actions based on the instrumentation metrics and the manifest, such as reporting the information to an instrumentation metrics server for aggregation and analysis by the metrics server or performing escalation actions that can modify the metrics collected and reported. | 09-30-2010 |
20100287535 | SYSTEM AND METHOD FOR TESTING SOFTWARE RELIABILITY USING FAULT INJECTION - A software reliability test system is provided. The software reliability test system includes a fault injection system and a workload generation system. The fault injection system creates a fault injection delegate to inject a fault into software selected as a test target from software of a target system. The workload generation system generates a workload in the selected software according to a control of the fault injection system to allow the fault injection delegate to inject the fault into the selected software. | 11-11-2010 |
20110004867 | AUTOMATED LEVEL-BASED TARGETED TEST CONFIGURATION - An indication of a change to at least one source file associated with a software build is received via a processor. A set of test levels of a level-based testing suite are sequentially processed, where each test level subsequently processed includes tests with decreasing qualitative testing information relative to tests associated with previously-processed test levels. For each processed test level, at least one test is selected that tests the change to the at least one source file associated with the software build, test coverage relative to a target risk level for the software build is determined for each selected test, and test selection is terminated upon determining that the test coverage for the selected tests at least meets the target risk level for the software build. | 01-06-2011 |
20110016454 | METHOD AND SYSTEM FOR TESTING AN ORDER MANAGEMENT SYSTEM - The invention describes a method for testing the order management system. The order management system includes a set of sub-systems. An order life cycle is defined for the order management system, based on the set of sub-systems. The order management system is capable of processing one or more orders. A script is selected from a plurality of scripts, which are developed for testing the order management system, based on a test scenario. The script is modified if the order management system has undergone a modification. Thereafter, the script is used for testing the order management system. Each sub-system of the set of sub-systems is tested, based on the order life cycle and the script, to identify an error in a first sub-system of the set of sub-systems. An output is generated, based on the error identified in the first sub-system. | 01-20-2011 |
20110029957 | COMPARISON OF RESULT OF PROGRAM OPERATION TO RESULT OF AN OPERATION OF A DIFFERENT VERSION OF THE PROGRAM - A system comprises a first computer on which a software program is executed. The software program causes an operation to be performed. The system also comprises a second computer coupled to the first computer and executes a different version of the software program. The second computer automatically duplicates the operation on the different version of the software program. An activity server is also coupled to the first and second computers to analyze a result of the operation on the first computer against a result of the operation on the second computer and to generate a notification when the result of the operation on the second computer is different. | 02-03-2011 |
20110041121 | RESPONSE TIME MEASUREMENT SYSTEM AND METHOD - Embodiments of the present invention relate to a computer-implemented method that includes binary weaving a second computer program code into the byte code of a first computer program code using a code weaver to form a third program product with a plurality of time measurement points. The programs can include sending a request via a network requesting information from a server computer system. The embodiment of the present invention may include measuring the execution time between the execution of a start point to the execution of a corresponding stop point. | 02-17-2011 |
20110055817 | PERFORMANCE MANAGEMENT TOOL HAVING UNIFIED ANALYSIS REPORT - An improved method is provided for identifying a cause of a performance problem experienced by an application in a computing environment. To help a user find and isolate the problem quicker, the method proposes a unified performance analysis report that presents the most likely indicators of the source of the performance problem. The report presents performance metrics for the software services used by the application and charts the metric values over time since it is often the change in a metric that indicates a problem. Each metric chart should also include an indicator for the state of service for the application. This will help the user correlate metrics from multiple sources to the time period in which the application experienced a problem. | 03-03-2011 |
20110067005 | SYSTEM AND METHOD TO DETERMINE DEFECT RISKS IN SOFTWARE SOLUTIONS - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive one or more risk factors, receive one or more contexts, identify one or more context relationships and associate the one or more contexts with the one or more risk factors. Additionally, the programming instructions are operable to map the one or more risk factors for an associated context to a software defect related risk consequence to determine a risk model and execute a risk-based testing based on the risk model to determine a defect related risk evaluation for a software development project. | 03-17-2011 |
20110067006 | SYSTEM AND METHOD TO CLASSIFY AUTOMATED CODE INSPECTION SERVICES DEFECT OUTPUT FOR DEFECT ANALYSIS - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive a tool error output determined by a code inspection tool and select at least one defect classification mapping profile based on the code inspection tool. Additionally, the programming instructions are operable to map the tool error output to one or more output classifications using the selected at least one defect classification mapping profile and generate at least one report based on the one or more output classifications. | 03-17-2011 |
20110107308 | REAL-TIME USER CONFIGURABLE DEBUGGING FRAMEWORK - Methods, systems, and computer program products for implementing a real-time, user configurable, debugging framework for use in debugging applications. A method includes executing an application on a computer, the application comprising a plurality of instructions including a debug macro instruction. The debug macro instruction is associated with a set of parameters for describing one or both of system and application conditions. The method also includes specifying one or more trigger criteria, the trigger criteria comprising a set of dynamic values for the set of parameters. The method further performing, while the application is executing, executing the debug macro instruction, detecting whether the trigger criteria have been met by the application, the detecting in response to executing the debug macro instruction, and upon detecting that the trigger criteria have been met, initiating a debugging session in response to the detecting. | 05-05-2011 |
20110126174 | Thread serialization and disablement tool - A computer-implemented method of performing runtime analysis on and control of a multithreaded computer program. One embodiment of the present invention can include identifying threads of a computer program to be analyzed. With a supervisor thread, execution of the identified threads can be controlled and execution of the identified threads can be monitored to determine a status of the identified threads. An indicator corresponding to the determined status of the threads can be output. | 05-26-2011 |
20110145796 | SYNCHRONIZATION COVERAGE IN LOGIC CODE - A method for enhancing synchronization coverage for a logic code is provided. The method comprises tracking whether one or more code sections in the logic code are blocked by at least another code section in the logic code, or whether one or more code sections in the logic code are blocking at least another code section in the logic code, during one or more test runs; and including one or more delay mechanisms in the logic code to introduce a delay in execution of a first code section in the logic code, wherein length of introduced delay is dependent on whether the first code section was blocked by a second code section or whether the first code section was blocking the second code section. | 06-16-2011 |
20110161935 | METHOD FOR MANAGING HARDWARE RESOURCES WITHIN A SIMULTANEOUS MULTI-THREADED PROCESSING SYSTEM - A method for managing hardware resources and threads within a data processing system is disclosed. Compilation attributes of a function are collected during and after the compilation of the function. The pre-processing attributes of the function are also collected before the execution of the function. The collected attributes of the function are then analyzed, and a runtime configuration is assigned to the function based of the result of the attribute analysis. The runtime configuration may include, for example, the designation of the function to be executed under either a single-threaded mode or a simultaneous multi-threaded mode. During the execution of the function, real-time attributes of the function are being continuously collected. If necessary, the runtime configuration under which the function is being executed can be changed based on the real-time attributes collected during the execution of the function. | 06-30-2011 |
20110197181 | PHASE-BASED TESTING OF OPERATING SYSTEMS - A method and system for phase-based testing of an operating system. The method may include detecting a failure when running a test of an operating system, identifying a phase in which the failure has occurred, and reporting the failure to a user, indicating the identified phase in which the failure has occurred. | 08-11-2011 |
20110197182 | DEBUGGING PARALLEL SOFTWARE USING SPECULATIVELY EXECUTED CODE SEQUENCES IN A MULTIPLE CORE ENVIRONMENT - Methods and apparatus relating to debugging parallel software using speculatively executed code sequences in a multiple core environment are described. In an embodiment, occurrence of a speculative code debug event is detected and a speculative code execution debug module is executed in response to occurrence of the event. Other embodiments are also disclosed and claimed. | 08-11-2011 |
20110209125 | GENERATING DEBUG INFORMATION ON DEMAND - An introspection tool monitors the execution of software. The operating system is being executed using an executable of a software source code file. The software source code file is associated with one or more additional source files. The introspection tool detects a trigger in a user script pertaining to monitoring of the execution of the software. The introspection tool identifies an additional source file that corresponds to the trigger in the user script and causes the additional source file to be compiled. The compiling of the additional source file generates debug information that pertains to the trigger and the introspection tool analyzes the debug information to respond to the trigger in the user script. | 08-25-2011 |
20110225569 | AUTOMATED DESKTOP BENCHMARKING - A plurality of user interactions in a baseline computing system are intercepted and recorded, in an artifact file, with a benchmarking tool. The recorded user interactions from the artifact file are replayed and injected to a software stack of a system under test (whose performance is to be compared to the baseline system), using the benchmarking tool. During the replay, screen updates in the system under test are sequentially compared with expected screen images from the artifact file, until a match is observed in a given case. A response time associated with each of the matches is recorded. | 09-15-2011 |
20110239196 | Micro-Task Pipeline Visualization - A digital system is described that includes a plurality of interconnected functional modules each having one or more event signal outputs, wherein each module is configured to execute one or more tasks and to assert an event signal on its respective one or more event signal outputs to indicate progress of execution of a task. An event monitor is connected to receive from each of the plurality of functional modules the one or more event signal lines, wherein the event monitor is configured to record the occurrence of each event signal assertion. An interface module is coupled to the event monitor and has an output for transferring an indication of each event signal assertion to an external monitoring system. | 09-29-2011 |
20110258608 | METHOD AND APPARATUS TO LOCATE BOTTLENECK OF JAVA PROGRAM - A method and an apparatus to locate a bottleneck of a Java program. The method to locate a bottleneck of a Java program includes the steps of: creating a helper thread in a Java process corresponding to the Java program, and attaching the helper thread to a Java virtual machine (JVM) created in the Java process; inserting a prober into an operating system kernel; monitoring states in the operating system kernel of Java threads in the Java process and sending a signal to the helper thread in response to detect that a Java thread is blocked; and retrieving call stack information from the JVM in response to receive the signal from the operating system kernel and locating the position in source code of the Java program that causes the block using the retrieved call stack information. | 10-20-2011 |
20110271258 | Software Development Tool - A system and method for providing a completion list associated with computer program source code and a dynamic expression. A dynamic analysis is performed to find and aggregate one or more candidate types of the expression. During an execution of the target program, a runtime monitor tracks events that may indicate a type of program variables. The analysis may include one or more of a number of static analysis techniques, including analyzing expressions that are assigned to a program variable, following method calls, examining system or other specified assemblies, loading runtime assemblies, or making inferences based on other uses of the variable. A completion list may be filtered or ordered based on a configured criteria. | 11-03-2011 |
20110289484 | Method and System for Script Processing for Web-Based Applications - A system is provided for creating and deploying script for web-based applications. The user can enter and edit the contents of a script package via a web application. During development, the script package may be sent to the server to be compiled and checked for errors. A simulated run-time environment can be generated on the server that can execute the script under a set of predefined conditions. The simulated run-time environment can allow the script to be tested before deployment. The results of the compile and execution tasks are sent back to the client so that the user can debug and perfect the script. The script package may then be stored in a database for continued development and/or editing and eventual deployment to a web server. | 11-24-2011 |
20110296387 | SEMAPHORE-BASED MANAGEMENT OF USER-SPACE MARKERS - A probe management system identifies a probe module for an application, which includes a semaphore table that has entries for a plurality of probe points in the application. An entry includes a semaphore variable value for a probe point. The probe management system identifies one or more probe points that are to be activated from an introspection user script. The user script is for examining the execution of the application at one or more of the probe points in the application. The probe management system adjusts the semaphore variable values for the identified probe points in the semaphore table in the probe module to represent to the application that a probe point is to be activated and causes the application to activate the identified probe points based on the adjusted semaphore variable values in the semaphore table. | 12-01-2011 |
20110307868 | SCRIPTING APPLICATION WITH ROLE IDENTIFICATION - In at least some embodiments, a computer system includes a processor and a computer-readable storage medium coupled to the processor and storing a scripting application. The scripting application, when executed, is configured to selectively record user actions on user interface (UI) objects of a browser hosted application based on identification of at least one role for each UI object. | 12-15-2011 |
20110307869 | DYNAMIC ADAPTIVE PROGRAMMING - Creating and executing platform portable code. A method includes declaring an object as being a dynamic object in a program. The program is a program compiled using a static language, except that the dynamic object is excluded from static analysis on the object when the program is compiled. The dynamic object includes a dependent call to a platform specific API. The platform specific API is available on one or more platforms to which a compiled version of the program will be deployed, but not available on one or more other platforms to which the compiled version of the program will be deployed. | 12-15-2011 |
20110321015 | HARDWARE TRIGGERING MECHANISM FOR SOFTWARE DEBUGGER - Embodiments of the invention utilize a signal analyzer to monitor a data path, the data path to include a plurality of transactions to be executed via a processor. The signal analyzer may further identify data of a first and a second transaction from the plurality of transactions. Transaction replication logic operatively coupled to the signal analyzer may generate a replicate transaction from the first transaction in response to the signal analyzer identifying the data of the first transaction, the replicate transaction to be stored in a memory. An interrupt generator operatively coupled to the signal analyzer may send an interrupt to the processor in response to the signal analyzer identifying at least the data of the second transaction, the processor to halt the execution of transactions and to pass control of execution of the second transaction to a debugging module in response to receiving the interrupt. | 12-29-2011 |
20120005657 | OPTIMIZATION OF AUTOMATED SYSTEM-MANAGED STORAGE OPERATIONS - Various embodiments for optimizing automated system-managed storage (SMS) operations in a computing storage environment. An execution of at least one automatic class selection (ACS) routine is monitored to determine at least one frequently used instruction. The ACS routine is modified for at least one predetermined time interval. The at least one frequently used instruction is moved to a higher execution priority of the modified ACS routine. | 01-05-2012 |
20120011490 | DEVELOPMENT SYSTEM - According to one embodiment, a development system includes an instruction set simulator (ISS) and a checker. The ISS includes a central processing unit (CPU) model that simulates an execution program and a memory model as a work area of the processor model. The checker monitors execution of an access instruction, included in the execution program, on the memory model and, when a difference between a data length at the time of writing and a data length at the time of reading on the same spot is detected, notifies an execution spot at the time of detection as an endian dependent spot. | 01-12-2012 |
20120036500 | CHANGE MANAGEMENT METHODOLOGIES FOR INDUSTRIAL AUTOMATION AND INFORMATION SYSTEMS - Systems and methods that facilitate electronic audit recording and tracking of interactions in an industrial control system via employing a differentiation engine that supplies an object-oriented presentation of an audit trailโand further present a view of a desired segment associated with a PLC program (e.g., a particular run of the PLC program), for an object that an audit is requested for. A user (e.g., a customer of the industrial process) can initially identify an object and subsequently view typically all changes to such identified object. Accordingly, a general requirement for checking every version to determine a change to the object is mitigated. | 02-09-2012 |
20120047491 | SYSTEM WITH A PRODUCTION SYSTEM AND A PROTOTYPE SYSTEM, AND A METHOD FOR THE OPERATION THEREOF - A computerized system has a production system for a data processing (in particular an image data processing) and a prototype system. The production system has a production runtime environment and the prototype system has a prototype runtime environment that is designed to be separate from the production runtime environment, and the prototype runtime environment is designed to be essentially identical to the production runtime environment. | 02-23-2012 |
20120066666 | ADD-ON PERFORMANCE ADVISOR - Various embodiments provide an add-on advisor that is designed to assist users in managing add-ons for a browser and/or other application programs. In at least some embodiments, the add-on advisor can be implemented to detect newly installed add-ons and provide notifications to a user of the detected add-ons. The notifications regarding new add-ons can be configured with options to permit the user to enable or disable the add-ons. Add-ons that are not explicitly enabled by a user can be prevented from operating by the add-on advisor. Further, in at least some embodiments, the add-on advisor can be implemented to monitor performance impact of add-ons and provide notifications to a user when add-ons adversely affect performance. The user can then interact with the add-on advisor to improve performance by selectively enabling and disabling add-ons. | 03-15-2012 |
20120066667 | SIMULATION ENVIRONMENT FOR DISTRIBUTED PROGRAMS - A scheduler receives a job graph which includes a graph of computational vertices that are designed to be executed on multiple distributed computer systems. The scheduler queries a graph manager to determine which computational vertices of the job graph are ready for execution in a local execution environment. The scheduler queries a cluster manager to determine the organizational topology of the distributed computer systems to simulate the determined topology in the local execution environment. The scheduler queries a data manager to determine data storage locations for each of the computational vertices indicated as being ready for execution in the local execution environment. The scheduler also indicates to a vertex spawner that an instance of each computational vertex is to be spawned in the local execution environment based on the organizational topology and indicated data storage locations, and indicates to the local execution environment that the spawned vertices are to be executed. | 03-15-2012 |
20120096441 | SYSTEM AND METHOD FOR DEBUGGING OF COMPUTER PROGRAMS - We describe techniques which relate to bi-directional, in particular backwards, debugging of computer programs. Thus we describe identifying processes with shared memory access, such as threads or multicore processes, by arranging process (thread) memory ownership to deliberate provoke memory page faults to identify and handle concurrent memory access by multiple threads in such a manner as to enable deterministic replay, and hence backwards debugging. | 04-19-2012 |
20120124560 | Autonomic Hotspot Profiling Using Paired Performance Sampling - A processor performance profiler is enabled to for identify specific instructions causing performance issues within a program being executed by a microprocessor through random sampling to find the worst-case offenders of a particular event type such as a cache miss or a branch mis-prediction. Tracking all instructions causing a particular event generates large data logs, creates performance penalties, and makes code analysis more difficult. However, by identifying and tracking the worst offenders within a random sample of events without having to hash all events results in smaller memory requirements for the performance profiler, lower performance impact while profiling, and decreased complexity to analyze the program to identify major performance issues, which, in turn, enables better optimization of the program in shorter developer time. | 05-17-2012 |
20120159453 | METHOD TO RECOGNIZE GUI OBJECT IN GLOBALIZED ENVIRONMENT - A method and apparatus for identifying GUI widgets of software are provided, comprising: during runtime of the software, determining a GUI window object and an ID thereof; determining all GUI widgets or all GUI widgets belonging to a same type in the GUI window object; partitioning the display area of the GUI window object into a plurality of areas such that each of the GUI widgets is uniquely contained in one area; specifying a unique ID for each area containing a GUI widget; and, identifying a GUI widget using the ID of the GUI window object and the ID of the area where the GUI widget resides, or the ID of the GUI window object, the ID of the type to which the GUI widget belongs and the ID of the area where the GUI widget resides, as the ID property of the GUI widget . | 06-21-2012 |
20120174075 | Automatically Testing a Web Application - A mechanism is provided for automatically testing a web application running inside a web browser. Pieces of test code are included in the web application code. An HTTP server provides a test service to the web application instrumented with test code. Through an API interface, the test code requests to the HTTP server that user inputs be simulated and sent to the browser. The HTTP server generates simulated system events corresponding to the user input and sends them to the browser. The browser processes the system events for the web application as usual. In this way the test code will check the data structure of the web application and the entire environment of the web application will be included as well. | 07-05-2012 |
20120192159 | AUTOMATED LEVEL-BASED TARGETED TEST CONFIGURATION - An indication of a change to at least one source file associated with a software build is received via a processor. A set of test levels of a level-based testing suite are sequentially processed, where each test level subsequently processed includes tests with decreasing qualitative testing information relative to tests associated with previously-processed test levels. For each processed test level, at least one test is selected that tests the change to the at least one source file associated with the software build, test coverage relative to a target risk level for the software build is determined for each selected test, and test selection is terminated upon determining that the test coverage for the selected tests at least meets the target risk level for the software build. | 07-26-2012 |
20120222015 | Security Role Testing Using an Embeddable Container and Properties Object - Mechanisms are provided for performing security role definition testing. An application is received in a container of a runtime environment of the data processing system. The application has methods and security role definitions associated with the methods. A properties object, which specifies a user identifier to security role mapping, is received in the container. A test application is executed, in the container, by the processor, on an execution of the methods of the application based on the user identifier to security role mapping and the security role definitions. The test application tests an operation of the application with regard to the security role definitions. A result of the execution of the test application on the execution of the methods of the application is then output. | 08-30-2012 |
20120222016 | Identifying Potential Lock Conditions in Transactional Software Applications - Methods for testing a transactional software application which interacts with a database structure. The software application includes a plurality of application units, which are adapted to be executed at least in part concurrently. The method includes executing the software application. Executing the software application includes executing a plurality of transaction operations on the database structure by a plurality of respective invocations of a database management system of the database structure by the respective plurality of application units. The method also includes determining locks being applied by the database management system on elements of the database structure for each transaction operation executed by each application unit individually. The method also includes identifying potential lock conditions of the software application in possible successions of application of the locks according to possible interleaving of the application units. | 08-30-2012 |
20120246622 | STORAGE OF SOFTWARE EXECUTION DATA BY BEHAVIORAL IDENTIFICATION - A method and system for identifying behavioral uniqueness of software execution sequence. The method comprises the steps of executing a software program and continuously producing an execution sequence of execution information, determining if the execution information is within a functional boundary of the software program, and determining if the execution sequence of the execution information is a new execution sequence or a repeat execution sequence. The system comprises a functional boundary detector for continuously analyzing an execution information of a software program to determine if the execution information is within a functional boundary of said software program, and a comparator provided for determining if an execution sequence of the execution information is a new execution sequence or a repeat execution sequence and producing a unique detection signal if the new execution sequence is detected. | 09-27-2012 |
20120266142 | System and Method for Automating Testing of Computers - An application under test may be run in a test mode that receives a series of test scenarios and produces a set of test results under the control of a verification application. The verification application utilizes โtyped-dataโ (i.e., data having known types that are associated with the data itself, e.g., XML-based data) such that a number of parameters can be set for each event and a number of result parameters can be checked for each result in at least one script. A series of scripts can be combined into an action file that may invoke scripts and override parameters within the invoked scripts. The events can be sent and received using a number of messaging protocols and communications adapters. | 10-18-2012 |
20120266143 | RESOURCE COST CORRELATION ACROSS DIFFERENT SUBSYSTEMS - A program can include declarative programming elements corresponding to elements of an actual state data structure. Data can be collected while the program is running. The collected data can include resource cost data from different runtime subsystems. A model state data structure, which can represent a data structure that could have produced the resource cost data, can be constructed from the collected data. A correlation data structure can be generated using the model state data structure. The correlation data structure can correlate the resource cost data from the different runtime subsystems and can attribute units of the resource cost data to the programming elements. At least a portion of the cost data can be analyzed with different analyzers using the correlation data structure. Additionally, analysis results from the different analyzers for the resource cost data can be composed together. | 10-18-2012 |
20120272221 | RULE BASED DATA DRIVEN VALIDATION - The technology provides for rule based data driven validation in which a rule engine identifies which rules are applicable to target data items of a target data object by their data types including any inherited data types. Additionally, a condition for a rule or a rule exemption is implemented also as a rule which is processed by the rule engine like any other rule. In one embodiment, a validation system includes an abstract rule store of rule instance data items which link to corresponding concrete rules which may be in different data formats. A corresponding rule provides access to rule logic which implements the corresponding rule. A rule engine and the abstract rule store may be accessed over a network by an application requesting validation of a target data object. Furthermore, in some examples, the data driven rule store can be implemented using the Microsoft .NETโข framework. | 10-25-2012 |
20120284697 | CODE EVALUATION BASED ON FAILURE PREDICTION - A method and apparatus for evaluating code. A likelihood that a set of segments of the code will not run as desired based on a policy is identified. A risk of the code not performing as desired is evaluated based on a result from a code coverage test and the likelihood that the set of segments of the code will not run as desired. | 11-08-2012 |
20120311539 | INTERACTIVE SEMI-AUTOMATIC TEST CASE MAINTENANCE - Embodiments of the invention relate to test case maintenance for user interfaces. In one embodiment, user source and test cases are linked for test case maintenance. A link is determined to have been created between a user interface and at least one test script. The test script includes a set of test instructions. The user interface includes a set of user interface elements. Each test instruction is run against the user interface. Mapping information for each test instruction is generated. A change is determined to have occurred in at least one of the user interface and the test script. In response to a change having occurred to the user interface, at least one test instruction affected by the change is identified. In response to a change having occurred to the test script, at least one user interface element affected by the change to the test script is identified. | 12-06-2012 |
20120311540 | PATH-SENSITIVE VISUALIZATIONS OF AGGREGATED PROFILING AND TRACE DATE - Performing tracing functionality. A method includes collecting runtime information that describes the execution of code. The collected runtime information is correlated to specific lines of code and one or more paths taken to get to specific lines of code. User input is received defining a view preference. A code visualization is provided based on the user input defining a view preference and the act of correlating the collected runtime information to specific lines of code and a path taken to get to the line of code. | 12-06-2012 |
20120311541 | INTERACTIVE SEMI-AUTOMATIC TEST CASE MAINTENANCE - Embodiments of the invention relate to test case maintenance for user interfaces. In one embodiment, user source and test cases are linked for test case maintenance. A link is determined to have been created between a user interface and at least one test script. The test script includes a set of test instructions. The user interface includes a set of user interface elements. Each test instruction is run against the user interface. Mapping information for each test instruction is generated. A change is determined to have occurred in at least one of the user interface and the test script. In response to a change having occurred to the user interface, at least one test instruction affected by the change is identified. In response to a change having occurred to the test script, at least one user interface element affected by the change to the test script is identified. | 12-06-2012 |
20120324428 | CONTENT DESIGN TOOL - Among other disclosed subject matter, a method includes providing a user interface allowing the insertion of elements into a document flow comprising static and dynamic elements, the user interface presenting a graphical depiction of the document that is dynamically altered by the insertion of the element, wherein the dynamically altered appearance of the document correctly reflects the position and type of the inserted element and rearranges all existing static and flow elements of the document around the inserted element. | 12-20-2012 |
20120331448 | COVERAGE MEASUREMENT APPARATUS AND METHOD AND MEDIUM - According to one embodiment, a coverage measurement apparatus includes a compiler unit, an execution environment unit, and a coverage calculation unit. The compiler unit produces a first object code from a program to be subjected to coverage measurement, and inserts an instruction to switch to a code rewriting process into the first object code, the code rewriting process being such that when the instruction is executed, the instruction is rewritten into a no-operation instruction. The execution environment unit executes the first object code, thereby producing a second object code. The coverage calculation unit calculates, based on the first and second object codes, the coverage of the program to be subjected to the coverage measurement. | 12-27-2012 |
20130014087 | SYNCHRONIZATION COVERAGE IN LOGIC CODE - A method for enhancing synchronization coverage for a logic code is provided. The method comprises tracking whether one or more code sections in the logic code are blocked by at least another code section in the logic code, or whether one or more code sections in the logic code are blocking at least another code section in the logic code, during one or more test runs; and including one or more delay mechanisms in the logic code to introduce a delay in execution of a first code section in the logic code, wherein length of introduced delay is dependent on whether the first code section was blocked by a second code section or whether the first code section was blocking the second code section. | 01-10-2013 |
20130031532 | METHOD, COMPUTER, AND DEVICE FOR VALIDATING EXECUTION OF TASKS IN ADAPTABLE COMPUTER SYSTEMS - The invention particularly relates to the validation of task execution in a testing environment that includes at least one cluster having a plurality of nodes, at least one of which includes a program for managing the performance of tests. After transmitting at least one characteristic of said nodes to a test element storage system, data representing at least one test enabling the execution of said task in said cluster is received ( | 01-31-2013 |
20130031533 | SYSTEM RELIABILITY EVALUATION DEVICE - A system reliability evaluation device | 01-31-2013 |
20130036404 | TESTING OF A SOFTWARE SYSTEM USING INSTRUMENTATION AT A LOGGING MODULE - In one embodiment, a method includes determining an instrumentation action to perform with the software program when a logging statement is encountered during execution of a software program. The instrumentation action is performed by an instrumentation service associated with a logging service and the execution of the software program is monitored based on the instrumentation action being performed. | 02-07-2013 |
20130055214 | SYSTEM AND METHOD TO INDICATE CODE BLOCK EXECUTION - In one implementation, computer executable instructions are provided to identify a group of instructions corresponding to a code block for an executable module. The instructions increment a counter associated with the code block to indicate the code block has been tested. | 02-28-2013 |
20130074048 | SYSTEM, INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF, IMAGE FORMING APPARATUS AND CONTROL METHOD THEREOF, AND COMPUTER-READABLE MEDIUM - An information processing apparatus which provides a development environment for an application to be executed by an image forming apparatus, comprises: a unit that generates, upon receiving an instruction to generate an application to be executed in the image forming apparatus, an application containing an application program for implementing a function of the application, a test program for testing a function provided by the application, and a test agent program for issuing a command to start execution of the test program in accordance with an instruction from the information processing apparatus; and a unit that issues, upon receiving an instruction to start the test program, an instruction via the test agent program to start execution of the test program contained in the application installed in the image forming apparatus. | 03-21-2013 |
20130074049 | Memoization Configuration File Consumed at Runtime - Memoization may be deployed using a configuration file or database that identifies functions to memorize, and in some cases, includes input and result values for those functions. As an application is executed, functions defined in the configuration file may be captured and memoized. During the first execution of the function, the return value may be captured and stored in the configuration file. For subsequent executions of the function, the return value may be stored in the configuration file. In some cases, the configuration file may be distributed with the return values to client computers. The configuration file may be created by one device and deployed to other devices in some deployments. | 03-21-2013 |
20130081000 | TEST FAILURE BUCKETING - Failure messages generated as a result of tests performed on a target application are bucketed in an effort to correlate related failure messages with minimal or no human interaction. An exemplary method for bucketing failure messages includes receiving a failure message, searching a stack trace of a target application for a blame stack trace frame from which the failure message originated, finding a most similar match bucket from a plurality of buckets, determining if the most similar match bucket at least meets a similarity threshold, adding the failure message to the most similar match bucket, if it is determined that the most similar match bucket at least meets the similarity threshold, and creating a new bucket and adding the failure message to the new bucket, if it is determined that the most similar match bucket does not at least meet the similarity threshold. | 03-28-2013 |
20130086557 | SYSTEM FOR TESTING AND CERTIFYING A VIRTUAL APPLIANCE ON A CUSTOMER COMPUTER SYSTEM - A system including a customer computer system configured to receive a test from a vendor computer system and execute the test on the customer computer system to test and certify a virtual appliance on the customer computer system. A customer computer system provides test failure data to the vendor computer system in response to the test failing and the customer computer system provides baselining of the virtual appliance in response to the test passing. | 04-04-2013 |
20130111450 | RUNTIME ENVIRONMENT AND METHOD FOR NON-INVASIVE MONITORING OF SOFTWARE APPLICATIONS | 05-02-2013 |
20130152053 | COMPUTER MEMORY ACCESS MONITORING AND ERROR CHECKING - Computer memory access monitoring and error checking systems and processes are disclosed herein. In one embodiment, a computer implemented method includes executing a computer program having a first object in a first memory location and having a value corresponding to a second memory location holding a second object. The method also includes, during a memory read from the second memory location, performing a comparison of a first version of the first memory location and a second version of the second memory location. The method further includes determining if an error exists in the computer program based on the comparison between the first version and the second version. | 06-13-2013 |
20130167123 | APPLICATION DEBUGGING - A computer implemented method including receiving an input, translating the input into a compiled application having a client portion and a server portion, receiving a client portion testing location and a server portion testing location, and instantiating a client virtual machine and a server virtual machine according to the respective client portion testing location and the server portion testing location. The method includes executing the compiled client application portion on the client virtual machine instantiated, executing the compiled server application portion on the server virtual machine instantiated, and monitoring execution of the compiled client and server application portions on the respective client and server virtual machines. | 06-27-2013 |
20130174126 | AUTOMATED TESTING OF PROGRAMMING CODE FOR A WEB SERVICE - The testing of programming code for a web service, such as code for a web service application program or for a web service application programming interface (API), is automatically performed. A set of web service requests is generated based on potential input values for fields of the requests that are included in a spreadsheet. The web service requests are firstly processed via execution of a production version of the programming code to generate a set of production web service responses, where the production version of the programming code is assumed to generate accurate web service responses. The web service requests are then processed via execution of a new version of the programming code to generate a set of new web service responses. The web service responses of the new and production sets are compared to determine whether the new version of the programming code functions accurately. | 07-04-2013 |
20130179864 | DEADLOCK FREE SYNCHRONIZATION SYNTHESIZER FOR MUST-HAPPEN-BEFORE RELATIONS IN PARALLEL PROGRAMS AND METHOD THEREOF - A deadlock free synchronization synthesizer for must-happen-before relations in at least two parallel programs or at least two threads each having multiple code segments has an input device to specify a synchronization point to involving code segments for each parallel program or thread and must-happen-before relations to the synchronization point, an analyzing module connected to the input device to detect existence of a deadlock in the parallel programs by using the must-happen-before relations, and a synthesizing module connected to the analyzing module to synthesize a practice code corresponding to the parallel programs if the deadlock existence detection is negative. | 07-11-2013 |
20130179865 | AUTOMATED ERROR CHECKING SYSTEM FOR A SOFTWARE APPLICATION AND METHOD THEREFOR - A test system for providing automatic testing of an application on a plurality of devices, the system including an input/output device for communicating with the plurality of devices, a processor and a memory that stores instructions which cause the processor to install an application on a device, monitor the device as it performs a series of steps, and record the results of the series of steps in a log. | 07-11-2013 |
20130185702 | RUN-TIME BOTTLENECK DETECTION - A method of detecting a bottleneck in a data flow program includes executing the data flow program, wherein the data flow program comprises a kernel, determining a percentage of time the kernel spends on a computation, and determining the kernel to be a bottleneck upon comparing the percentage of time the kernel spends on the computation to a condition. | 07-18-2013 |
20130198722 | MANAGING TRANSACTIONS WITHIN A MIDDLEWARE CONTAINER - A computer collects first test metrics on a transaction hosted within a middleware container, and is executing within a first environment. The computer generates baseline values of expected execution behavior of the transaction based on the first test metrics. The computer collects second test metrics on the transaction hosted within the middleware container, and is executing within a second environment. The computer compares the second test metrics to the baseline values. The computer determines whether the second test metrics satisfy the baseline values. In response to the second test metrics not satisfying the baseline values, the computer identifies the transaction as a candidate for cancellation. | 08-01-2013 |
20130198723 | MAPPING HIGH-PERFORMANCE COMPUTING APPLICATIONS TO PLATFORMS - The mapping of High Performance Computing (โHPCโ) applications to platforms is provided. An HPC application characterization module determines an HPC application signature to characterize the HPC application. An HPC application mapping module selects a platform from a plurality of platforms to execute the HPC application based on the HPC application signature and a set of benchmarks. An HPC application monitoring module monitors the execution of the HPC application on the selected platform. | 08-01-2013 |
20130219369 | DEBUGGING OBJECT ABSTRACTIONS - The claimed subject matter provides for systems and/or methods for debugging a computer-executable file. The computer-executable file may be executing in a first runtime environment and located in a first process. The file may further comprise on object having a proxy in that first runtime environment. One method embodiment comprises the steps of debugging said computer-executable file; detecting a proxy for an object called by said file; decoding said proxy to obtain physical information regarding said object; returning said physical object information; and transforming said physical object information into logical object information. In addition, one embodiment of a system is provided that comprising a debugger, said debugger debugging client code; a proxy decoder, said proxy decoder providing information to said debugger about the object pointed by said proxy; and an abstraction transformation, said abstraction transformation transforming physical expressions of a proxy into higher level logical expressions. | 08-22-2013 |
20130232472 | Method and Apparatus for the Determination of a Quality Assessment of a Software Code with Determination of the Assessment Coverage - In a method for determining a quality assessment of a software code, the coverage is concomitantly calculated when determining the assessment. In order to increase the coverage, additional measurement results and assessments may be taken into account. Following changes to the software base, it is determined which of the additional measurements and assessment results should be renewed in order to provide or ensure the defined coverage. | 09-05-2013 |
20130254748 | Partial Recording of a Computer Program Execution for Replay - A method, system and program product for recording a program execution comprising recording processor context for each thread of the program, results of system calls by the program, and memory pages accessed by the program during an execution interval in a checkpoint file. Processor context includes register contents and descriptor entries in a segment descriptor table of the operating system. System calls are recorded for each program thread, tracked by an extension to the operating system kernel and include returned call parameter data. Accessed memory pages are recorded for each program process and include data, libraries and code pages. The program address space, processor context, and program threads are reconstructed from checkpoint data for replaying the program execution in a different operating system environment. | 09-26-2013 |
20130275952 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING UNWANTED DATA BASED ON AN ASSEMBLED EXECUTION PROFILE OF CODE - A system, method, and computer program product are provided for identifying unwanted data based on an assembled execution profile of code. In use, an execution profile of code is assembled by tracking interface usage of the code. Further, it is determined whether the code is associated with unwanted activity, based on the execution profile. | 10-17-2013 |
20130346949 | ADAPTIVE RENDERING BASED ON RUNTIME CAPABILITY CHECK - A runtime capability check determines functionality supported by a client application (e.g. a browser) on a computing device. During the runtime capability check, the client application (e.g. the browser) attempts to execute different function tests to determine its capabilities. The result information from the function tests are stored. The stored result information is used by the client application during subsequent connections with the server (e.g. the cookie is passed from the mobile computing device to the server). Based on the supported functionality as determined by the stored result information, the rendering code is adapted for, generated and delivered to the computing device by the server. For example, when the client application supports the tested functionality then the server renders the content using full feature rendering. When the client application does not support all of the tested functionality then the server renders the content using limited feature rendering. | 12-26-2013 |
20140033179 | APPLICATION TESTING - An application testing module running on a virtual machine environment includes a trigger for taking a snapshot of the virtual machine environment while an application under test is running on the virtual machine environment. | 01-30-2014 |
20140040866 | MANAGING CODE INSTRUMENTATION IN A PRODUCTION COMPUTER PROGRAM - A method, system, and/or computer program product manages code instrumentation in a production computer program. Performance data from instrumentation code associated with a portion of code of a production computer program is received. One or more processors compare the performance data to a predetermined performance threshold. In response to the performance data meeting the predetermined performance threshold, one or more processors remove the instrumentation code for the portion of code. | 02-06-2014 |
20140068566 | MICROCODE UPGRADE IN A STORAGE SYSTEM - A method for upgrading microcode in a multi-module storage system may include selecting a first module from two or more modules and operating the first module using an upgraded microcode. The method may include monitoring the performance of the first module by a second module of the two or more modules and rendering an indication of performance of the first module. Further, the method may include determining whether the indication of performance of the first module is greater than or equal to a performance metric. | 03-06-2014 |
20140075417 | Method and Arrangement for Enabling Analysis of a Computer Program Execution - Method and arrangement in a computer ( | 03-13-2014 |
20140089901 | EMBEDDING PERFORMANCE MONITORING INTO MASHUP APPLICATION DEVELOPMENT - Computer systems, methods and program products can facilitate embedding performance monitoring into a mashup application that is being created in a mashup application development environment. A mashup application analyzer identifies mashup application performance monitors that are applicable to a mashup application that is being created in a mashup application development environment. An instructor is provided to instruct the mashup application development environment to embed selected ones up of the performance monitors into the mashup application that is being created in the mashup application development environment, responsive to a selection from the performance monitors. A provisioner instructs the mashup application development environment how to provision the selected ones of the mashup application performance monitors in the mashup application that is being created in the mashup application development environment, responsive to a selection of provisioning options for the selected ones of the mashup application performance monitors. | 03-27-2014 |
20140109063 | CAPTURING TEST DATA ASSOCIATED WITH ERROR CONDITIONS IN SOFTWARE ITEM TESTING - In a method of testing a software item, an automated test of a software item is conducted. In response to occurrence of an error condition during the test, test data associated with the error condition is captured. A portion of the captured test data is forwarded to a designated electronic notification location. | 04-17-2014 |
20140123114 | FRAMEWORK FOR INTEGRATION AND EXECUTION STANDARDIZATION (FIESTA) - A framework for end-to-end scenario-level automated testing of a multi-technology application. Execution of end-to-end automated testing of a multi-technology application is triggered from a single platform on a local client machine, The end-to-end automated test comprises a plurality of tests each developed from a different testing tool. Test result data is received from the execution of the tests. Test result data is passed from the execution of one of the tests to a different test for use in the execution of the different test. A log of results is generated for the end-to-end automated testing of the multi-technology application based on the received test result data from the execution of the plurality of tests. In some embodiments, execution of a test on a back-end system is triggered from the single platform on the local client machine. In some embodiments, the back-end system is an ABAP back-end system. | 05-01-2014 |
20140123115 | HYBRID LOCAL/REMOTE INFRASTRUCTURE FOR DATA PROCESSING WITH LIGHTWEIGHT SETUP, POWERFUL DEBUGGABILITY, CONTROLLABILITY, INTEGRATION, AND PRODUCTIVITY FEATURES - The disclosed technology provides a hybrid local/remote hosted MapReduce framework and infrastructure comprising systems and methods for improving setup, configuration, controllability, debuggability, and integration of a compute job and systems and methods for increasing programmer productivity. The system applies an interpreted programming language for the programmer's custom Map and Reduce algorithms, such that those algorithms can execute identically on both the hosted service as well as locally (e.g., on the programmer's local computing system or device) for development and debugging purposes. Furthermore, the disclosed system delivers this serviceโa hosted MapReduce infrastructureโin a simple and transparent web service. | 05-01-2014 |
20140189655 | IDENTIFICATION OF PERFORMANCE BOTTLENECKS - Embodiments are directed to identifying, by an apparatus comprising a processing device, a pattern in a graph that has a support value greater than a threshold, wherein: the graph comprises a plurality of weighted nodes coupled to one another by one or more weighted edges, and each of the plurality of nodes is associated with at least one weighted attribute. | 07-03-2014 |
20140237453 | EXCEPTION BASED QUALITY ASSESSMENT - The embodiments may include an apparatus for measuring code quality using exceptions. The apparatus may include a runtime collector configured to intercept exceptions generated by an application, and collect exception information for each exception, during runtime of the application, based on instrumentation code included within the application. The apparatus may include a collection module configured to store the intercepted exceptions and corresponding exception information in a memory unit, an exception analyzer configured to analyze the intercepted exceptions based on the collected exception information stored in the memory unit, and a report generator configured to generate at least one report based on the analysis. The at least one report may provide an indication of code quality of the application. | 08-21-2014 |
20140258989 | METHOD AND SYSTEM FOR AUTOMATING A SCENE-BASED TEST - There are provided a method and a system for automating a scene-based test. The method for automating a scene-based test that is performed by a system for automating a scene-based test, and the method includes a preparing step of preparing a scene scenario that includes at least two or more program scenesโimages constituting a screen of a testing target device on which a program to be tested is executed or a set of the imagesโand an event object linking the program scenes, an executing step of interpreting the scene scenario in a time-series manner to execute the scene scenario, and transmitting an event signal corresponding to the event object to the testing target device linked to the system via communication when the event object is executed, and a result generating step of receiving a program execution log from the testing target device, and generating a test result. | 09-11-2014 |
20140282422 | USING CANARY INSTANCES FOR SOFTWARE ANALYSIS - Techniques for evaluating a second version of software. Embodiments selectively route incoming requests to software instances within a plurality of baseline instances and a plurality of canary instances, where the baseline instances run a first software version and the canary instances run the second software version. The software instances are monitored to collect performance data for a plurality of performance metrics. Embodiments calculate aggregate baseline performance metrics, where each of the aggregate baseline performance metrics is calculated based on the collected performance data for the plurality of baseline instances. For each of the performance metrics and canary instances, embodiments calculate a relative performance value that measures the collected performance data for the respective canary instance and for the respective performance metric, relative to the corresponding aggregate baseline performance metric. A final measure of performance is calculated for the second version of software, based on the relative performance values. | 09-18-2014 |
20140282423 | METHODS AND APPARATUS TO MANAGE CONCURRENT PREDICATE EXPRESSIONS - Methods, apparatus, systems and articles of manufacture are disclosed to manage concurrent predicate expressions. An example method discloses inserting a first condition hook into a first thread, the first condition hook associated with a first condition, inserting a second condition hook into a second thread, the second condition hook associated with a second condition, preventing the second thread from executing until the first condition is satisfied, and identifying a concurrency violation when the second condition is satisfied. | 09-18-2014 |
20140282424 | TECHNIQUES FOR TRAVERSING REPRESENTATIONS OF SOURCE CODE - Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include beginning to traverse the AST, monitoring a history of the traverse, and continuing to traverse the AST based on the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations, the concrete implementations being traversed being selected based on the history of the traverse. | 09-18-2014 |
20140282425 | APPLICATION TESTING AND ANALYSIS - Application testing and analysis may include performing perturbations to affect an environment associated with the application executing on a user device without affecting other applications executing on the user device. The execution of the application may be traced while the perturbations are being performed to determine an amount of resources of the user device consumed by the application and to determine whether a performance of the application was degraded. | 09-18-2014 |
20140298299 | METHOD FOR DETERMINING WHETHER A MACHINE CODE INSTRUCTION OF A MACHINE CODE PROGRAM IS EXECUTED IN THE MACHINE CODE PROGRAM - A method for determining whether a machine code instruction of a machine code program is executed in the machine code program may include: replacing at least a part of a first machine code instruction of a plurality of first machine code instructions with a second machine code instruction, the second machine code instruction configured to generate a code exception; executing the machine code program including the second machine code instruction; and determining whether the second machine code instruction is executed based on the code exception. | 10-02-2014 |
20140298300 | Guarding a Monitoring Scope and Interpreting Partial Control Flow Context - A computer implemented method for maintaining a program's calling context correct even when a monitoring of the program goes out of a scope of a program analysis by validating function call transitions and recovering partial paths before and after the violation of the program's control flow. The method includes detecting a violation of control flow invariants in the software system including validating a source and destination of a function call in the software system, interpreting a pre-violation partial path responsive to a failure of the validating, and interpreting a post violation path after a violation of program flow. | 10-02-2014 |
20140310692 | SERVER THROTTLED CLIENT DEBUGGING - Systems and methods of debugging client applications may provide for detecting a runtime error in a first version of a client application, and obtaining a second version of the client application server in response to the runtime error. The second version of the client application may be used to conduct a diagnosis of the runtime error. | 10-16-2014 |
20140331209 | Program Testing Service - A service provider network includes host computers that have various computing devices connected thereto. In order to test the operation of a program, a developer creates a program and one or more test cases for use in testing the program. The developer also identifies devices in the service provider network for use in testing the program. Once this selection has been made, a test request is submitted to the service provider network. When the service provider network receives the test request, the program is installed on the devices upon which testing is to be performed. The supplied test case is then utilized to test various aspects of the operation of the program on the devices. Once the testing of the program has completed, the results of the testing may be transmitted to the developer. A similar process might be utilized to test a program on a variety of device emulators. | 11-06-2014 |
20140351797 | ERROR INJECTION INTO THE LEAF FUNCTIONS OF CALL GRAPHS - A computer identifies a target for an injection of an error. The computer monitors the call graph, of a program being tested, for instances of the target. The computer identifies an instance of the target in the call graph. The computer determines if the instance of the target satisfies two or more parameters required for error injection. If the computer determines that the instance of the target does satisfy two or more parameters required for error injection, then the computer injects a first instance of an error into a leaf function of the call graph. The execution of the first instance of the injected error results in a first code path, of the program being tested, to be followed. | 11-27-2014 |
20140380280 | DEBUGGING TOOL WITH PREDICTIVE FAULT LOCATION - Identifying a code segment that has a likelihood of causing a program failure. Program code is executed to a failure point. A plurality of code segments executed in the program code prior to the failure point are identified. Changesets that contain at least one of the identified code segments are identified. The identified code segments are then ranked as a function of likelihood that each respectively ranked identified code segment caused the failure point, based, at least in part, on the identified changesets. In another aspect of the invention, at least some of the ranked code segments along with an indication of the ranking are reported. | 12-25-2014 |
20140380281 | AUTOMATED SOFTWARE TESTING - Disclosed in some examples are systems, machine readable mediums and methods which automate testing of web-based application code by automatically generating test harnesses based on a specified configuration and test script, hosting the test harness, causing the test harness to be run to test the code, and delivering the test results to the user. In some examples, the specified conditions may specify one or more test environments corresponding to an execution environment. This allows users greater flexibility in support of testing libraries and support of testing environments. The end users of the software under test will be provided software that is better tested for many different environments. | 12-25-2014 |
20150095892 | SYSTEMS AND METHODS FOR EVALUATING A CHANGE PERTAINING TO A SERVICE OR MACHINE - Techniques for evaluating the performance of a service or machine after a change that pertains to the service or machine are described. For example, an indication of a change that pertains to a service or machine is received. In response to the receiving of the indication of the change, using at least one computer processor, a performance of the service or machine after the change is evaluated. The evaluation may be based on a particular rule for evaluating the performance of the service or machine after the change. An evaluation result is generated based on the evaluating of the performance of the service or machine after the change. The evaluation result indicates the quality of the performance of the service or machine after the change. | 04-02-2015 |
20150095893 | OPTIMIZING TEST DATA PAYLOAD SELECTION FOR TESTING COMPUTER SOFTWARE APPLICATIONS THAT EMPLOY DATA SANITIZERS AND DATA VALIDATORS - Testing computer software applications is implemented by probing a computer software application to determine the presence in the computer software application of any data-checking features, and applying a rule to the data-checking features that are determined to be present in the computer software application, thereby producing a testing set of inputs. The testing set includes any sets of inputs that were used to test sets of data-checking software, where each of the sets of data-checking software includes one or more data sanitizers and/or data validators, and where the rule is configured to produce the testing set to include one or more of the sets of inputs when the rule is applied to any of the data-checking features. The computer software application is tested using the testing set. | 04-02-2015 |
20150106789 | CONTINUOUS MONITORING AND ANALYSIS OF SOFTWARE EVENTS - A set of entry blocks is allocated. An entry block is configured with a set of monitoring attributes to store monitoring data corresponding to a monitoring request. The entry block is updated with an identifier supplied in the monitoring request. The entry block is used to store the monitoring data responsive to the monitoring request. The monitoring data comprises a continuous record of data changes at a requested location in memory from a beginning to an end a of an event corresponding to the monitoring request. A size of the monitoring data is distinct from another size of another monitoring data stored in another entry block in the set of entry blocks responsive to another monitoring request. An operation specified in the monitoring request is performed on a part of the monitoring data accessible from a monitoring attribute in the set of monitoring attributes of the entry block. | 04-16-2015 |
20150106790 | DETECTING MERGE CONFLICTS AND COMPILATION ERRORS IN A COLLABORATIVE INTEGRATED DEVELOPMENT ENVIRONMENT - A method, system, and computer program product for detecting merge conflicts and compilation errors in a collaborative integrated development environment are provided in the illustrative embodiments. Prior to at least one user committing a set of uncommitted changes associated with a source code to a repository, the computer receives the set of uncommitted changes associated with the source code. The computer creates at least one temporary branch corresponding to the set of uncommitted changes associated with the source code. The computer device merges the at least one temporary branch to corresponding portions of the source code. The computer determines whether a merge conflict has occurred. If the merge conflict occurred, the computer communicates a first notification to the at least one user, the first notification indicating the merge conflict. | 04-16-2015 |
20150106791 | SYSTEM AND METHOD FOR AUTOMATING BUILD DEPLOYMENT AND TESTING PROCESSES - A system and computer-implemented method for automating build deployment and testing processes related to development of software is provided. The system comprises a user interface configured to facilitate users to provide input parameters for build deployment and testing. The system further comprises a build manager configured to facilitate deploying code if the users provide the input parameters related to build deployment. Further, the system comprises a scheduler configured to schedule execution of test scripts for testing the code based on the input parameters. Furthermore, the system comprises a run manager configured to assign the test scripts to testing machines for execution based on execution schedule, monitor execution status of the test scripts and send the execution status to test management systems and the users via communication channels. In addition, the system comprises a reporting module configured to generate reports related to build deployment and test scripts execution. | 04-16-2015 |
20150301928 | PROGRAM DEVELOPMENT IN A DISTRIBUTED SERVER ENVIRONMENT - According to one embodiment of the present invention, a system for processing a computer program for a distributed server environment executes the computer program in the distributed server environment in accordance with a configuration for the computer program. The computer program is generated within a development environment. The configuration indicates a type of server environment and is associated with one or more data sets for processing by the computer program. The system monitors execution of the computer program within the distributed server environment and provides a program status to the development environment. The system displays results produced by the computer program within the distributed server environment via the development environment. Embodiments of the present invention further include a method and computer program product for processing a computer program in substantially the same manners described above. | 10-22-2015 |
20150356000 | REMEDIATION OF KNOWN DEFECTS AND VULNERABILITIES IN CLOUD APPLICATION PACKAGES - A method for applying remediation policy to a cloud application package having a set of components is described. The method is initiated in response to discovery of a new vulnerability. It begins by comparing information from a deployment description against a data set of known problems associated with the one or more of the components. The deployment description represents the set of components and their interrelationships. For each of the one or more components, one or more known problems that satisfy a given severity and/or complexity criteria are identified. Thereafter, and with respect to at least one of the components for which one known problem satisfying the given criteria has been identified, the remediation policy (e.g., an update, a replacement, a patch, an additional installable) is applied to attempt to rectify the known problem. After applying the policy, the old version of the package is replaced with the new version. | 12-10-2015 |
20150378799 | Automatic memory leak detection - A method comprises: executing an executable code by s computer processor; repetitively executing at least a portion of the executable code comprising dynamic memory allocation requests and dynamic memory deallocation requests, wherein a repetition number of the repetitive executions is an integer value greater than one; in response to execution of each of the dynamic memory allocation requests generating a record, each of the records comprising a unique memory identification of the main memory dynamically allocated upon the execution of the each of the dynamic memory allocation requests and a unique code identification of a fragment of the executable code and/or of a fragment of a source code corresponding to the fragment of the executable code. | 12-31-2015 |
20160004624 | EVALUATION OF AN APPLICATION - It is presented a method for evaluating an application intended to be installed in a wireless terminal of a cellular network. The method is performed in an application development device and comprises the steps of: obtaining performance data associated with an execution of the application in a test wireless terminal in a simulated or real cellular network, the performance data being obtained for each cellular data session of the execution of the application, each cellular data session being defined as a period when the test wireless terminal is in a cellular network connection state when data transfer is possible; and evaluating the performance data by comparing the in performance data with reference performance data, the comparison being based on the duration of each cellular data session. | 01-07-2016 |
20160004627 | Utilizing semantic clusters to Predict Software defects - A method, apparatus and product for utilizing semantic clusters to predict software defects. The method comprising: obtaining a plurality of software elements that are associated with a version of a System Under Test (SUT), wherein the plurality of software elements comprise defective software elements which are associated with a defect in the version of the SUT; defining, by a processor, a plurality of clusters, wherein each cluster of the plurality of clusters comprises software elements having an attribute, wherein the attribute is associated with a functionality of the SUT; and determining a score of each cluster of the plurality of clusters, wherein the score of a cluster is based on a relation between a number of defect software elements in the cluster and a number of software elements in the cluster. | 01-07-2016 |
20160011961 | ERROR INJECTION INTO THE LEAF FUNCTIONS OF CALL GRAPHS | 01-14-2016 |
20160124832 | MONITORING AND CORRELATING A BINARY PROCESS IN A DISTRIBUTED BUSINESS TRANSACTION - A dynamic monitoring process begins with configuring a start and end method to be monitored. The dynamic monitoring process may intercept both the start and end methods as and when the loader is initiated or at runtime to dynamically attach and detach the instrumentation. A loader may then be modified to call a library method upon detection of the start method. The library method may serve as a notification to the start of the method and causes a reflector to retrieve information from the incoming request. The incoming information may include data from which a business transaction name may be determined. The business transaction name is then associated with the monitoring of the particular request. When an exit call is detected, a call may be made to the library for a method which invokes a decorator. The decorator may insert business transaction name and other data into the outgoing call. | 05-05-2016 |
20160147637 | CONTEXTUAL DEBUGGING OF SQL QUERIES IN DATABASE-ACCESSING APPLICATIONS - Various embodiments of systems and methods for validating Structured Query Language (SQL) queries in a database-accessing software application during application development are described herein. In some embodiments, an SQL query can be copied, during debugging of the software application, from a program editor used to define the software application into an SQL console that facilitates modifying and executing the query and displays data resulting from the execution of the query. Upon developer validation of the SQL query, the validated query may be copied back into the software application to substitute the original query. The SQL query may include one or more unresolved parameters that can be resolved by the SQL console via access to memory in which the software application is executed during debugging. | 05-26-2016 |
20160179654 | ELAPSED TIME INDICATIONS FOR SOURCE CODE IN DEVELOPMENT ENVIRONMENT | 06-23-2016 |
20160179657 | AUTO-DEPLOYMENT AND TESTING OF SYSTEM APPLICATION TEST CASES IN REMOTE SERVER ENVIRONMENTS | 06-23-2016 |
20160179661 | MONITORING AND CAPTURING EARLY DIAGNOSTIC DATA | 06-23-2016 |
20160188441 | TESTING MULTI-THREADED APPLICATIONS - In one example, a method for testing a multi-threaded application includes running an initial test of the multi-threaded application and collecting thread generation data and determining the thread hierarchy. The thread execution is then modified to produce a modified configuration and a second test is run with the modified configuration. A device for testing of multi-threaded applications is also provided. | 06-30-2016 |
20170235668 | Green Software Applications | 08-17-2017 |
20180024906 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING SYSTEM | 01-25-2018 |
20220138083 | METHOD FOR OPERATING A CONTROL UNIT WHEN TESTING SOFTWARE OF THE CONTROL UNIT, AND METHOD FOR OPERATING A TEST COMPUTER WHEN TESTING SOFTWARE OF A CONTROL UNIT - A method for operating a control unit when testing software of the control unit. The control unit includes a processor for executing the software and a memory for storing the software. The method includes: receiving test requests, generated by a test computer, in the control unit; executing a test program for testing the software based on the test requests, by executing a first binary file, which is stored in the memory, by the processor, the first binary file encoding a test version of the software which includes at least one test module necessary for executing the test program; sending test results from the control unit to the test computer; and receiving a second binary file, executable by the processor, in the control unit and storing the second binary file in the memory when the test computer has determined, based on the test results, that the software is fit for operation. | 05-05-2022 |