38th week of 2014 patent applcation highlights part 232 |
Patent application number | Title | Published |
20140282405 | PROBATIONARY SOFTWARE TESTS - A method, computer program product, and system is described. A continuous integration environment is identified. A first software test associated with the continuous integration environment is identified. A probationary status for the first software test is determined, the probationary status indicating, at least in part, a potential lack of reliability for the first software test. | 2014-09-18 |
20140282406 | AUTOMATIC RISK ANALYSIS OF SOFTWARE - Techniques are described herein that are capable of performing automatic risk analysis of software. An automatic risk analyzer may determine correlations between binaries of the software and source files of the software, between the source files and functions (i.e., sub-routines) of the software, between changes to source code of the software and defects, new features, and/or feature enhancements in the software, between attributes of the software (e.g., attributes associated with the changes to the source code), etc. at various time instances. The automatic risk analyzer may compare the correlations corresponding to a first time instance and the correlations corresponding to a second time instance to determine any of a variety of temporal relationships regarding underlying factors, including but not limited to new feature(s), feature enhancement(s), defect(s), churn rate, code coverage, code complexity, etc. The automatic risk analyzer may determine risk(s) for the software based on the temporal relationships. | 2014-09-18 |
20140282407 | TEST SCRIPT GENERATION SYSTEM - A test script generation system may generate end-to-end test scripts to test a software application. A workflow generator may generate recommendations of suggested modules corresponding to domain-specific reference application maps to include in a workflow. A visual representation of the workflow may be generated and provide an indication of suggested modules that have not been included in the workflow. A script generator may generate the end-to-end test scripts based on the workflow. | 2014-09-18 |
20140282408 | Systems and Methods for Synchronizing Software Execution Across Data Processing Systems and Platforms - Systems and methods for software automation are provided. Software testcases are distributed across multiple data processing systems (equivalently, “machines” or “hosts”) that may collectively include multiple platforms (equivalently, “operating systems”). A testcase may be executed as one or more processes progressing through a sequence of phases, with execution within a phase being asynchronous among processes. Synchronization of the testcase processes across the data processing systems and platforms may be effected by managing an event; the testcase processes block on the event upon completion of the current testcase phase. A testcase phase execution service on each host handles synchronization events. The definition of the testcase may include metadata that identifies the particular phases in sequence, that is phase names, for the testcase; the phase names identifies the phases to the synchronization process that triggers the synchronization events which initiate each succeeding phase of the testcase. | 2014-09-18 |
20140282409 | IMPROVED DATA INTEGRATION TOOL - Computer-implemented systems and methods are disclosed for providing proactive validations of transformation scripts. In one implementation, a method is provided that includes associating, with at least one processor, the transformation script with ontology parameters. The method also includes initiating a debugging operation of the transformation script having at least one condition and importing, from a data source, at least one data item for transformation. The method further includes determining, as part of the debugging operation, whether the at least one condition that uses the at least one data item is valid based on the ontology parameters and notifying a user, on a display device, of a result associated with the determination. | 2014-09-18 |
20140282410 | PROBATIONARY SOFTWARE TESTS - A method, computer program product, and system is described. A continuous integration environment is identified. A first software test associated with the continuous integration environment is identified. A probationary status for the first software test is determined, the probationary status indicating, at least in part, a potential lack of reliability for the first software test. | 2014-09-18 |
20140282411 | Test Case Reduction for Code Regression Testing - In at least one embodiment, a system performs regression testing of software using selected test cases. In at least one embodiment, the system selects the test case for regression testing based on whether the test case correlates with modified code. In at least one embodiment, a test case correlates with the modified code if the test case tests all or a proper subset of the modified code. In at least one embodiment, if a test case does not test any of the modified code, then the test case is not used in the regression testing of the modified code. | 2014-09-18 |
20140282412 | System And Method For Automatic Generation Of Software Test - Disclosed herein is a system and method for automatically generating a test for a design process. The present system and method compares a keyword list associated with a design process and keyword lists associated with kernels and/or algorithms, temporarily associating matching kernels and/or algorithms with the design process, testing the kernels and/or algorithms with an input and designates the best output as the expected output. | 2014-09-18 |
20140282413 | REMOTE SOFTWARE DEPOLYMENT ACROSS A NETWORK - Methods, computer-readable media, and systems are provided for deployment of software tools across a network. One example method includes initiating a discovery mechanism to poll a plurality of computing machines | 2014-09-18 |
20140282414 | METHOD AND SYSTEM FOR DEBUGGING OF A PROGRAM - A computer implemented method for debugging of a program may include parsing a code segment of the program, the code segment invoking one or a plurality of execution events during an execution of the program to derive a plurality of questions, each relating to an execution event of said one or a plurality of execution events, based on the parsing of the code segment and on information recorded during the execution of the program. The method may also include selecting one of the questions as a current question. The method may further include presenting in a user interface the current question with one or a plurality of causes related to the current question, and one or a plurality of other questions of said one or a plurality of questions for selection by the user. | 2014-09-18 |
20140282415 | METHOD AND SYSTEM FOR DEBUGGING A PROGRAM - A computer-implemented method and system for debugging a program is disclosed. The method may include obtaining data on inter-component calls of a call chain of an execution run of the program between segments of Multilanguage software components of the program, the data relating to the identity of the Multilanguage software components in which these segments are included and an order in which the segments are called in the call chain. The method may further include obtaining a user selection relating to one of the segments of the Multilanguage software components that were called in the call chain. The method may also include invoking a debugger designed for debugging the software component of the Multilanguage software components that includes the selected segment and displaying a user interface of that debugger on a display device. | 2014-09-18 |
20140282416 | METHOD AND SYSTEM OF VISUALLY COMBINING PROFILING DATA FROM INSTRUMENTATION AND SAMPLING - Method and systems of visually depicting instrumented and sampled data are provided. A first stream of instrumented data, the instrumented data collected via execution of code contained in a user-scriptable engine. Then a second stream of sampled data is received, the sampled data collected by monitoring execution of code contained in scripts executed by the user-scriptable engine. Then an aggregated version of a portion of the instrumented data and an aggregated version of a portion of the sampled data are simultaneously displayed in one or more viewing regions. Then user interaction with an object pertaining to the aggregated version of a portion of the instrumented data is received. In response to the receiving user interaction with the object pertaining to the aggregated version of a portion of the instrumented data, the aggregated version of the portion of the sampled data is caused to change to depict a different aggregated version of a portion of the sampled data. | 2014-09-18 |
20140282417 | JAVASCRIPT DEBUGGING USING JUST MY CODE - The present invention extends to methods, systems, and computer program products for stepping through JavaScript code in a debugger without landing on errors in library or open source code. A debugger receives user inputs designating one or more segments of the JavaScript code as library code. The debugger then performs debugging operations on the JavaScript code. The debugging operations including a stepping operation for stepping through the JavaScript code to identify errors only in user-generated segments of the JavaScript code, wherein the user-generated segments correspond to code that was not designated as library code. | 2014-09-18 |
20140282418 | RECORDING PROGRAM EXECUTION - Among other things, a method includes, at a computer system on which one or more computer programs are executing, receiving a specification defining types of state information, receiving an indication that an event associated with at least one of the computer programs has occurred, the event associated with execution of a function of the computer program, collecting state information describing the state of the execution of the computer program when the event occurred, generating an entry corresponding to the event, the entry including elements of the collected state information, the elements of state information formatted according to the specification, and storing the entry. The log can be parsed to generate a visualization of computer program execution. | 2014-09-18 |
20140282419 | SOFTWARE VERIFICATION - A method of verifying software includes receiving at least a portion of a software program. The portion of the software program may include a software function within a class. The method may also include generating a proxy class based on the class where the proxy class includes a proxy function that includes a call to the software function and analyzing the proxy function. The analysis of the proxy function may include analyzing the software function based on a proxy condition used by the proxy function, the proxy condition based on the software program and configured to apply conditions to parameters and/or variables in the software function. | 2014-09-18 |
20140282420 | TEST AUTOMATION BOOSTER - A method is provided for a proxy server to assist in the testing of a product. The method includes receiving, from the product, a first request and passing the first request to a server, receiving, from the server, a first response to the first request and passing the first response to the product, recording the first request and the first response, generating one or more second responses from one or more simulated servers based on the first request and the first response, intercepting a second request from the product, in response to the second request, matching the second request to a second response, and sending the second response to the product. | 2014-09-18 |
20140282421 | DISTRIBUTED SOFTWARE VALIDATION - A computer-implemented method for validation of a software product via a distributed computing infrastructure includes receiving configuration data for a plurality of validation tasks of the validation, receiving code data representative of the software product, defining a validation pipeline to implement the plurality of validation tasks based on the configuration data, and initiating execution of the plurality of validation tasks on a plurality of virtual machines of the distributed computing infrastructure. Initiating the execution includes sending the code data and data indicative of the defined validation pipeline to configure each virtual machine in accordance with the code data and the defined validation pipeline. | 2014-09-18 |
20140282422 | USING CANARY INSTANCES FOR SOFTWARE ANALYSIS - Techniques for evaluating a second version of software. Embodiments selectively route incoming requests to software instances within a plurality of baseline instances and a plurality of canary instances, where the baseline instances run a first software version and the canary instances run the second software version. The software instances are monitored to collect performance data for a plurality of performance metrics. Embodiments calculate aggregate baseline performance metrics, where each of the aggregate baseline performance metrics is calculated based on the collected performance data for the plurality of baseline instances. For each of the performance metrics and canary instances, embodiments calculate a relative performance value that measures the collected performance data for the respective canary instance and for the respective performance metric, relative to the corresponding aggregate baseline performance metric. A final measure of performance is calculated for the second version of software, based on the relative performance values. | 2014-09-18 |
20140282423 | METHODS AND APPARATUS TO MANAGE CONCURRENT PREDICATE EXPRESSIONS - Methods, apparatus, systems and articles of manufacture are disclosed to manage concurrent predicate expressions. An example method discloses inserting a first condition hook into a first thread, the first condition hook associated with a first condition, inserting a second condition hook into a second thread, the second condition hook associated with a second condition, preventing the second thread from executing until the first condition is satisfied, and identifying a concurrency violation when the second condition is satisfied. | 2014-09-18 |
20140282424 | TECHNIQUES FOR TRAVERSING REPRESENTATIONS OF SOURCE CODE - Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include beginning to traverse the AST, monitoring a history of the traverse, and continuing to traverse the AST based on the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations, the concrete implementations being traversed being selected based on the history of the traverse. | 2014-09-18 |
20140282425 | APPLICATION TESTING AND ANALYSIS - Application testing and analysis may include performing perturbations to affect an environment associated with the application executing on a user device without affecting other applications executing on the user device. The execution of the application may be traced while the perturbations are being performed to determine an amount of resources of the user device consumed by the application and to determine whether a performance of the application was degraded. | 2014-09-18 |
20140282426 | DIVIDE AND CONQUER APPROACH TO SCENARIO TIMELINE ACTIVITY ATTRIBUTION - In one embodiment, a system analyzer may iteratively sub-partition the trace timeline | 2014-09-18 |
20140282427 | DIAGNOSTICS OF STATE TRANSITIONS - A method for diagnosing computer readable instructions related to transfers of control is disclosed. A state transition of a unit of execution within a logical operation is logged during runtime of the computer readable instructions. Diagnostic information of the logical operation is associated with the state transition. The state transition and associated diagnostic information is provided for retrieval at a selected point in the computer readable instructions. | 2014-09-18 |
20140282428 | EMBEDDING AND EXECUTING TRACE FUNCTIONS IN CODE TO GATHER TRACE DATA - Provided are a computer program product, system, and method for embedding and executing trace functions in code to gather trace data. A plurality of trace functions are embedded in the code. For each embedded trace function, a trace level is included indicating code to which the trace applies. The trace level comprises one of a plurality of levels. During the execution of the code, the embedded trace functions having one of the levels associated with a specified at least one level specified are executed. The embedded trace functions associated with at least one level not comprising one of the at least one specified level are not invoked. | 2014-09-18 |
20140282429 | Algorithm Selection For Collective Operations In A Parallel Computer - Algorithm selection for collective operations in a parallel computer that includes a plurality of compute nodes may include: profiling a plurality of algorithms for each of a set of collective operations, including for each collective operation: executing the operation a plurality times with each execution varying one or more of: geometry, message size, data type, and algorithm to effect the collective operation, thereby generating performance metrics for each execution; storing the performance metrics in a performance profile; at load time of a parallel application including a plurality of parallel processes configured in a particular geometry, filtering the performance profile in dependence upon the particular geometry; during run-time of the parallel application, selecting, for at least one collective operation, an algorithm to effect the operation in dependence upon characteristics of the parallel application and the performance profile; and executing the operation using the selected algorithm. | 2014-09-18 |
20140282430 | METHOD AND SYSTEM THAT FILTERS BYTE-CODE INSTRUMENTATION AT THE INSTRUMENTATION LEVEL - The current application is directed to crosscutting functionalities, including byte-code instrumentation, error logging, and other such crosscutting functionalities. These crosscutting functionalities generally violate, or run counter to, modern code-development strategies and programming-language features that seek to partition logic into hierarchically organized compartments and modules with related functionalities, attribute values, and other common features. In particular, the current application is directed to byte-code instrumentation introduced into a computer program for collecting data, such as execution traces, elapsed times for routine execution, and other information at run time for logging and subsequently manual, semi-automatic, or automatic analysis. The current application is particularly directed to byte-code instrumentation that automatically filters collected data in order to log only data having greatest value for subsequent analysis. | 2014-09-18 |
20140282431 | NATIVE CODE PROFILER FRAMEWORK - Embodiments provide systems, methods, and computer program products for dynamically hooking multiple levels of application code. A server receives identifying information that identifies a target function of a target application to hook. The server pauses a target process of the target application. The server locates the target function within the target application code based on the received identifying information. The server then hooks the located function outside of the target application, thereby creating hooked code during application runtime. | 2014-09-18 |
20140282432 | ANALYZING INCOMPLETE SOFTWARE - A method of analyzing an incomplete software program may include receiving high-level software code of a software program that includes multiple functions. The multiple functions may include at least one incomplete function and at least one complete function. The method may further include compiling at least a portion of the high-level software code to generate low-level software code by compiling the complete function and passing over the incomplete function. The method may further include modifying the low-level software code to account for a call to the incomplete function in the low-level software code and symbolically executing the low-level software code. | 2014-09-18 |
20140282433 | TESTING FUNCTIONAL CORRECTNESS AND IDEMPOTENCE OF SOFTWARE AUTOMATION SCRIPTS - Various embodiments automatically test software automation scripts. In one embodiment, at least one software automation script is obtained. The software automation script is configured to automatically place a computing system into a target state. A plurality of test cases for the software automation script is executed. Each of the plurality of test cases is a separate instance of the software automation script configured based at least on one or more different states of the computing system. The software automation script is determined to be one of idempotent and non-idempotent and/or one of convergent and non-convergent based on executing the plurality of test cases. | 2014-09-18 |
20140282434 | TESTING FUNCTIONAL CORRECTNESS AND IDEMPOTENCE OF SOFTWARE AUTOMATION SCRIPTS - Various embodiments automatically test software automation scripts. In one embodiment, at least one software automation script is obtained. The software automation script is configured to automatically place a computing system into a target state. A plurality of test cases for the software automation script is executed. Each of the plurality of test cases is a separate instance of the software automation script configured based at least on one or more different states of the computing system. The software automation script is determined to be one of idempotent and non-idempotent and/or one of convergent and non-convergent based on executing the plurality of test cases. | 2014-09-18 |
20140282435 | PERFORMANCE PROFILING APPARATUS AND PERFORMANCE PROFILING METHOD - A performance profiling apparatus includes: a plurality of counters provided for a routine included in a program; a storage section configured to store an instruction of the program and an identification information indicating the routine of the program; a processor configured to read the instruction from the storage section and to execute a process according to the instruction; and a counter controller configured to, at the time of reading the instruction of the processor, receive the identification information of the instruction which is output from the storage section with the instruction and to instruct a first counter designated by the identification information to count up. | 2014-09-18 |
20140282436 | TESTING A SOFTWARE INTERFACE FOR A STREAMING HARDWARE DEVICE - Embodiments of the disclosure relate to testing a software interface for a streaming hardware device through simulation. Methods include receiving, by a processor, a data manipulation request and a data segment associated with the data manipulation request and generating, by the software interface, an input data stream comprising control information and the data segment. The method also includes transmitting the input data stream to a simulation device and generating, by the simulation device, an output data stream in response to the input data stream, the output data stream including a delineator, control data, a manipulated data segment and a trailing delineator. The simulation device is configured to simulate the operation of the streaming hardware device by performing the data manipulation request. | 2014-09-18 |
20140282437 | METHOD AND APPARATUS TO SCHEDULE STORE INSTRUCTIONS ACROSS ATOMIC REGIONS IN BINARY TRANSLATION - A method and system to support scheduling of memory store instructions across atomic regions in binary translation in a processing unit or processor. In one embodiment of the invention, the processing unit has a store buffer that allows store instructions to be issued in different order than the source binary program order but still retire in source binary program order. This facilitates a small atomic region that maps to each iteration of a source binary code and these atomic regions are joined together into a pipelined region. In one embodiment of the invention, the processing unit executes commit instruction(s) once every loop iteration instead of executing the commit instruction(s) once after the loop exit. | 2014-09-18 |
20140282438 | METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR IMPROVING PRODUCTIVITY FOR BUILDING APPLICATIONS - An apparatus is provided for building an application. The apparatus may include at least one memory and at least one processor configured to generate a build of an application in a C Object-Oriented Programming Language. The processor is also configured to generate a unity file including a plurality of source files having references to one or more header files. At least two of the source files include references to a same header file. The processor is also configured to compile the unity file including the plurality of source files to obtain an object file. The processor is also configured to link the object file to generate an executable of the application. Corresponding computer program products and methods are also provided. | 2014-09-18 |
20140282439 | MIGRATION ASSISTANCE USING COMPILER METADATA - Systems and methods are migration assistance using compiler metadata. An example system includes a data module that receives data associated with a compiler. The data includes a set of rules associated with the compiler. The example system also includes an extraction module that extracts from the data, compiler metadata including the set of rules associated with the compiler. The example system further includes a database that stores the compiler metadata. The example system also includes a patch module that receives a program including source code, retrieves from the database the compiler metadata, and generates, without compiling the received program, a set of migration patches based on the received program and the compiler metadata. The set of migration patches includes one or more changes to the received program to abide by the set of rules associated with the compiler. | 2014-09-18 |
20140282440 | TRANSITIONING BETWEEN CODE-BASED AND DATA-BASED EXECUTION FORMS IN COMPUTING SYSTEMS AND ENVIRONMENTS - Techniques for transitioning between code-based and data-based execution forms (or models) are disclosed. The techniques can be used to improve the performance of computing systems by allowing the execution to transition from one of the execution models to another one of the execution models that may be more suitable for carrying out the execution or effective processing of information in a computing system or environment. The techniques also allow switching back to the previous execution model when that previous model is more suitable than the execution model currently being used. In other words, the techniques allow transitioning (or switching) back and forth between a data-based and code-based execution (or information processing) models. | 2014-09-18 |
20140282441 | STATIC TYPE CHECKING ACROSS MODULE UNIVERSES - Static type checking can be performed on types and values defined in modules in a system that dynamically composes programs from modules. The types and values do not share a global namespace. Each module defines its own module universe, disjoint from other modules. A language mechanism can establish a local name binding to one module within the content of another module. When type checking at compile time an environment can be established that corresponds to a runtime instance of the program. The static type system can be arranged to align with the runtime values, such that the names used to refer to objects at runtime are the same as the names used to refer to the types of those objects in the static type system. Aliases of a particular type are resolved to a known compile time description of the type. | 2014-09-18 |
20140282442 | STATICALLY EXTENSIBLE TYPES - Statically extensible types allow a static type system to model the behavior of dynamic object model extension in dynamic runtime systems. Static types that model dynamically extended types can be extended using additional declarations in the same compilation. Declarations for a particular type can come from multiple independent sources which can have been defined at multiple points in time. Extension declarations can use the same syntax as the initial type declaration. Hence presence of one or more declarations for the same type in a compilation can indicate that the type has been extended. These features allow static type checking of dynamic plug-ins to be supported using statically extensible types. Declarations and extension declarations for a type can be merged together to create an extended type that enables different processing paths and dependencies. | 2014-09-18 |
20140282443 | CONTEXTUAL TYPING - Type inference is used to provide the benefits of static type checking without explicitly declaring type in the source code. Type inference that proceeds in a bottom up direction is augmented by contextual typing that proceeds in a top down direction. Contextual typing types enclosed expressions by associating the type of a directly enclosing expression with the enclosed expression. Object literals, function literals and array literals enclosed in assignment and call expressions, can be contextually typed. | 2014-09-18 |
20140282444 | PROGRAMMING LANGUAGE TRANSFORMATIONS WITH ABSTRACT SYNTAX TREE EXTENSIONS - Techniques to automate the transformation of an application involving programming language constructs from a composite of source grammars to a composite of target grammars, while maintaining the fidelity of the program semantics and functionality, or extending or changing it to explode the capabilities and avoid the limitations of new technologies are disclosed. The different stages of the transformation are persisted in an annotated abstract syntax tree where the annotations represent semantic preserving transformation rules. The abstract syntax tree is then transformed according to the transformational rules. The transformed abstract syntax tree may then be traversed to generate a new translated source code application or be queried to generate output reports. Alternatively, the transformed abstract syntax tree may be subjected to another transformation as part of a chain of transformations. | 2014-09-18 |
20140282445 | AUTOMATED CODE ANALYZER - Systems, methods, and computer program products for analyzing source code are disclosed. The system includes a file reader module on a computer, a parser module on a computer, a metrics accumulator module, and a reporting engine on a computer. The file reader module may read an input source code file. The parser module may parse source code in the source code file into source code components. The metrics accumulator module may analyze the source code components in accordance with one or more rules to generate application metadata. The reporting engine may use the generated application metadata to generate a report of the analysis. | 2014-09-18 |
20140282446 | MODIFICATION OF COMPILED APPLICATIONS AND APPLICATION MANAGEMENT USING RETRIEVABLE POLICIES - A multi-component control technique includes a first component and a second component. The first component is supplemental code or evaluation engine as specified by a modification to a set of received originally compiled executable code. The modification to the original executable code ensures that, upon execution, the supplemental code (such as an evaluation engine) as specified by the modification is executed upon initial instantiation or use of the application. The second component is a retrievable and executable policy such as a set of rules fetched and used by the supplemental code to control the functionality supported by the originally compiled executable code of the corresponding application. An application administrator can produce the retrievable policy to control functionality of the originally compiled executable code. | 2014-09-18 |
20140282447 | PERSISTENT VARIABLES IN PROGRAMMING LANGUAGES - Techniques for automatically persisting variable data are provided. In one embodiment, a computer system can identify, upon compiling or interpreting source code for an application, a variable in the source code that is declared with a predefined keyword. The predefined keyword can indicate that the variable should be persistent. The computer system can then generate, for each instance in the source code where data is assigned to the variable, runtime code for saving the data in a nonvolatile data store. | 2014-09-18 |
20140282448 | OPERATING SYSTEM SUPPORT FOR CONTRACTS - A front-end compiler compiles source code into intermediate code, that may later be compiled into binary code. The source code defines an execution scope and includes a contract. When a contract is encountered at runtime of an execution scope, further execution of that execution scope is conditioned on whether a predicate associated with the contract is true. The front-end compiler operates so as to preserve the contract so that the contract continues to be semantically structured such that the predicate may be removed from the intermediate language code. The contract may thus continue to be understood by semantic analysis of the contract. Thus, the predicate may be understood by static analysis tools that operate on the intermediate code. | 2014-09-18 |
20140282449 | INCREMENTAL COMPILATION OF A SCRIPT CODE IN A DISTRIBUTED ENVIRONMENT - Disclosed here are methods, systems, paradigms and structures for incrementally compiling scripts at runtime to generate executable code. In a first phase, an executable block for a basic block of the script is generated for a set of types of variables of the basic block. In a second phase, a set of executable blocks whose profiling information, such as frequency of (a) execution, (b) transition between executable blocks, or (c) execution of a path, satisfies an optimization criterion is identified, and an executable control region is generated. In a third phase, profiling information from a number of systems in a distributed environment is aggregated, and an executable control region corresponding to the aggregated profile is generated. The executable code generated in each of the phases is more optimal than the code generated in a previous phase, and is used for execution until replaced by the code of a subsequent phase. | 2014-09-18 |
20140282450 | SOFTWARE BUILD OPTIMIZATION - A method for optimization of a software build includes collecting first data representative of inputs for a build process obtained by a set of data accessing operations implemented during a first execution of the build process, the set including a file accessing operation and a non-file accessing operation. A redirection routine embedded within the build process captures the inputs. The first data is compared with second data representative of the inputs obtained in connection with a second execution of the build process. If the first and second data do not match, the second data is recorded in a data store and output data generated by the second execution of the build process is stored. If the first and second data match, output data generated by the first execution of the build process is used as an output for the second execution of the build process. | 2014-09-18 |
20140282451 | IDENTIFICATION AND MANAGEMENT OF UNSAFE OPTIMIZATIONS - Techniques for implementing identification and management of unsafe optimizations are disclosed. A method of the disclosure includes receiving, by a managed runtime environment (MRE) executed by a processing device, a notice of misprediction of optimized code, the misprediction occurring during a runtime of the optimized code, determining, by the MRE, whether a local misprediction counter (LMC) associated with a code region of the optimized code causing the misprediction exceeds a local misprediction threshold (LMT) value, and when the LMC exceeds the LMT value, compiling, by the MRE, native code of the optimized code to generate a new version of the optimized code, wherein the code region in the new version of the optimized code is not optimized. | 2014-09-18 |
20140282452 | SYSTEM AND METHOD FOR REDUCING THE STATIC FOOTPRINT OF MIXED-LANGUAGE JAVA.TM. CLASSES - A system and a method for minimizing the functionality-gap between JAVA™ and native platforms while keeping the impact on each JAVA™ API static footprint as small as possible. A JAVA™ Runtime Dynamic Invocation API is used for low-level bridging between JAVA™ and C/C++, enabling the dynamic invocation of native C/C++ functions and C++ class/object methods from the JAVA™ side without adding any additional ad hoc implemented native code to the overall JAVA™ component implementation. Thereby, the need to write new native code when implementing a JAVA™ component that needs to invoke some native functionality is reduced. | 2014-09-18 |
20140282453 | SYSTEMS AND METHODS FOR FACILITATING APPLICATION DEVELOPMENT UTILIZING PLUGINS - Systems, apparatus, methods, and articles of manufacture provide for determining at least one criterion for establishing an offer campaign based on a player's experience on gaming platform (e.g., via a gaming website) and/or determining whether a player qualifies for one or more offers based on the player's experience. | 2014-09-18 |
20140282454 | Stack Data Management for Software Managed Multi-Core Processors - Methods and apparatus for managing stack data in multi-core processors having scratchpad memory or limited local memory. In one embodiment, stack data management calls are inserted into software in accordance with an integer linear programming formulation and a smart stack data management heuristic. In another embodiment, stack management and pointer management functions are inserted before and after function calls and pointer references, respectively. The calls may be inserted in an automated fashion by a compiler utilizing an optimized stack data management runtime library. | 2014-09-18 |
20140282455 | APPLICATION PROFILING - A system and associated methods are disclosed for profiling the execution of program code by a processor. The processor provides an instruction set with special profiling instructions for efficiently determining the bounds and latency of memory operations for blocks of program code. Information gathered regarding the bounds and latency of memory operations are used to determine code optimizations, such as allocation of memory for data structures in memory more local to the processor. | 2014-09-18 |
20140282456 | METHODS, SYSTEMS AND COMPUTER-READABLE MEDIA FOR CODE PROFILING AND MIGRATION EFFORT ESTIMATION - Systems, methods and computer-readable storage media for profiling software and providing migration effort estimations are described. A software profiling system may be configured to receive code for an application that executes in a first computing environment and analyze the code to determine efforts associated with migrating the application to execute in one or more second computing environments. For instance, the software profiling system may be configured to determine the migration efforts for migrating a software application that operates in a non-cloud computing environment to a cloud computing environment. The software profiling system may generate transformation points that serve as estimation units for solving anomalies identified to bring various aspects of the application into conformance with one or more of the second computing environments. The transformation points may be used to determine an overall migration effort for migrating the application to one or more of the second computing environments. | 2014-09-18 |
20140282457 | Systems And Methods For Embedded Shared Libraries In An Executable Image - Systems and methods are provided for deploying new software application features as a dynamically-loadable executable package including one or more dynamically-linked shared dependent libraries. The dynamically-loadable executable package may be capable of being loaded into volatile memory and executed in an information handling system environment with or without the dependent shared libraries, and without duplicating the presence or use of redundant shared libraries that may be already present on the existing software stack. | 2014-09-18 |
20140282458 | SYSTEMS AND METHODS FOR PROVISIONING EQUIPMENT - Systems and methods for provisioning building equipment are provided. A disclosed provisioning system includes a main control unit having a processing circuit, a memory device, and a data communications interface. The provisioning system further includes an auxiliary control unit and a portable data storage device. The portable data storage device is physically separate from the main control unit and has an update file stored therein. The update file includes a plurality of partitions, each partition including provisioning data and metadata. The main control unit identifies a first partition of the update file containing first provisioning data for the main control unit and a second partition of the update file containing second provisioning data for the auxiliary control unit. The processing circuit is configured to extract the provisioning data from the identified partitions and to apply the extracted provisioning data to the main control unit and the auxiliary control unit. | 2014-09-18 |
20140282459 | AUTOMATED PATCH GENERATION - A computer-implemented method, computer program product, and computing system is provided for generating software patches. In an implementation, a method may include receiving an indication of a software product and a product level of the software product. An indication of a specific defect associated with the software product and the product level may be received. A defect change-set associated with a correction of the specific defect may be identified. An overlapping change-set may be determined based on, at least in part, a source control history associated with the software product. The overlapping change set may occur between the product level and the defect change-set in the source control history and may implicate at least one common with the defect change-set. A software patch correcting the specific defect may be generated based on the defect change-set and the overlapping change-set. | 2014-09-18 |
20140282460 | ENTERPRISE DEVICE UNENROLLMENT - A method and apparatus are described for unenrolling applications, such as from a mobile device. An enterprise can be associated with one or more applications. Rather than uninstalling the applications individually, a single unenroll user interface command can be used to remove all data on the mobile device associated with the enterprise. Moreover, the applications associated with the enterprise can be uninstalled. A user's personal data on the mobile device is not affected during the unenrollment. | 2014-09-18 |
20140282461 | CONCURRENT PATCHING OF SHARED LIBRARIES - Provided are techniques for generating a patch corresponding to a shared library; determining that the patch fits within the shared library; generating a signature corresponding to the shared library and an offset corresponding to the patch; identifying an instantiation of the shared library stored in a memory; and overlying the patch in the instantiation at a position corresponding to the offset. | 2014-09-18 |
20140282462 | DYNAMIC LIBRARY REPLACEMENT - Provided are techniques for an OS to be modified on a running system such that running programs, including system services, so not have to be stopped and restarted for the modification to take effect. The techniques include detecting, by a processing thread, when the processing thread has entered a shared library; in response to the detecting, setting a thread flag corresponding to the thread in an operating system (OS); detecting an OS flag, set by the OS, indicating that the OS is updating the shared library; in response to detecting the OS flag, suspending processing by the processing thread and transferring control from the thread to the OS; resuming processing by the processing thread in response to detecting that the OS has completed the updating; and executing the shared library in response to the resuming. | 2014-09-18 |
20140282463 | Concurrent Patching of Shared Libraries - Provided are techniques for generating a patch corresponding to a shared library; determining that the patch fits within the shared library; generating a signature corresponding to the shared library and an offset corresponding to the patch; identifying an instantiation of the shared library stored in a memory; and overlying the patch in the instantiation at a position corresponding to the offset. | 2014-09-18 |
20140282464 | SYSTEMS AND METHODS FOR INTERCEPTING, PROCESSING, AND PROTECTING USER DATA THROUGH WEB APPLICATION PATTERN DETECTION - Systems and methods of intercepting user data of a web application are provided. After web application resources are obtained for execution on a client device, methods that process user data of the web application are added to create modified web application resources. Certain runtime application calls are intercepted. This can be achieved by modifying the actual code to replace calls to certain functions with calls to the added methods, or by using overloading. The data processing may add data security functionality. | 2014-09-18 |
20140282465 | Methods for Dynamic Mobile Application Behavior Modification Subject to a Behavior Policy - The present invention provides a mechanism to change how mobile device applications, particularly Android applications, work; essentially selectively modifying their behavior. Where an application provides a useful operation but also has functionality that can be detrimental to the desired action of a device, use of the application becomes problematic. The present invention provides a method of modifying the use of the application without invasive reprogramming of the code. Prior art attempts to modify applications included software modifications and rewrites and would often cause buggy operation of the application; even to the extent of damaging the desired functionality. Such modifications could be contrary to intellectual property rights and software licensing. The present invention provides a means to make modifications to the functionality without modifying the application. As a result, performance of the desired outcome is not affected and because there is no modification of the actual software, legal boundaries are maintained. | 2014-09-18 |
20140282466 | SYSTEMS AND METHODS FOR MERGING METADATA-BASED APPLICATIONS - Systems and methods for mergeable metadata-based applications may be provided. According to some embodiments, a method may include determining, by a computer including one or more processors, one or more changes to be made to an application on a target computer. The method may also include identifying metadata associated with the application, the metadata corresponding to the one or more changes to be made. Furthermore, the method may include generating at least one tag associated with the metadata. The at least one tag may include information that describes one or more database definitions included in the metadata. Additionally, the method may include wrapping the at least one tag and the metadata into a mergeable metadata application and transmitting, to the target computer, the mergeable metadata application. | 2014-09-18 |
20140282467 | Method and Apparatus for Multiple Vehicle Software Module Reflash - A system includes a processor configured to wirelessly receive update requests from a plurality of vehicles. The processor is also configured to, for each request, determine if any vehicle modules require updating. Also, the processor is configured to retrieve an updated version and sending the updated version to a vehicle for reflashing, for each module that requires updating. The processor is additionally configured to receive confirmation for each module that has been reflashed and update a vehicle configuration with a version identifier corresponding to the updated version for each reflashed module | 2014-09-18 |
20140282468 | LOCAL STORE DATA VERSIONING - Embodiments are directed to maintaining coherence between web application versions, to maintaining proper versions between web application clients and servers and to determining whether to apply a web application update. In one scenario, a computer system receives a data request from a web application client for certain specified data. The data is indexed according to a web application schema, and the data request includes a web application client version identifier. The computer system determines that the requested data is not accessible using the web application schema, updates the web application schema to a current version of the web application schema and processes the received data request using the updated web application schema. | 2014-09-18 |
20140282469 | MECHANISM FOR SAFE AND REVERSIBLE ROLLING UPGRADES - Methods, systems, and computer storage media for updating instances of a service application within nodes of a data center are provided. The system includes a state machine equipped for designating an earlier version of software running on some instances as a basement version and a newer version of software running on other instances as a latest version. The system also includes a compatibility mechanism responsible for allowing the basement version, the latest version, and other versions of the service application therebetween to interact using a data structure associated within the earlier version, or lowest common version of the service application. The compatibility mechanism is located apart from core logic of the service application. The activities of the state machine and the compatibility mechanism allow the instances to communicate with each other (using the lowest common version) while exposing just the validated version(s) of the service application to the client. | 2014-09-18 |
20140282470 | REMOTE TRANSFER OF ELECTRONIC IMAGES TO A VEHICLE - Described are systems and methods for transmission of data between one or more vehicles and a control apparatus (e.g., server or other computing device). In particular, the invention relates to systems, methods and computer program products for over-the-air transmission of electronic images (EIs) between one or more vehicles and a control sub-system. The inventions also relates to a standardized methodology and system for implementation of remote EI updates. | 2014-09-18 |
20140282471 | Dynamically Loaded Plugin Architecture - A method and architecture for using dynamically loaded plugins is described herein. The dynamically loaded plugin architecture comprises a parent context and a plugin repository. The parent context may define one or more reusable software components. The plugin repository may store one or more plugins. When a plugin is loaded, a child context may be created dynamically. The child context is associated with the plugin and inherits the one or more reusable software components from the parent context. | 2014-09-18 |
20140282472 | SYSTEM AND METHOD FOR VIRTUAL ASSEMBLY PATCHING IN A CLOUD ENVIRONMENT - Described herein is a system and method for virtual assembly patching in a cloud environment. In accordance with an embodiment, a virtual assembly builder can be used to virtualize installed components in a reference environment, and then deploy those components into another destination environment. A user can capture the configuration and binaries of software components into software appliance artifacts, which can be grouped and their relationships defined as software assembly artifacts. In accordance with an embodiment, assemblies stored as disk images in a repository can be patched by creating replacement images, importing the replacement images into the virtualization environment, and then performing a replacement or swap of an instance's existing virtual disks, with patched versions of those disks. | 2014-09-18 |
20140282473 | Software Upgrade Analysis System - A system may include computer code for analyzing an upgrade from a first version to a second version of a software program that has been customized without performing the upgrade. The system may provide default state information of default program objects. The default program objects would be included in a default installation of the second version of the software program. The computer code may retrieve current state information of current program objects from an application database. The software program that has been customized may include the current program objects. The system may generate upgrade information based on a comparison between the current state information and the default state information. The upgrade information may identify a subset of the current program objects that would be impacted by the upgrade. | 2014-09-18 |
20140282474 | SYSTEM AND METHOD FOR SOFTWARE FEATURE MANAGEMENT - A method includes providing a computer readable code configured to perform a process of feature management. The computer code includes one or more configurable features having a feature property. The feature property includes a state. The method also includes: running the computer readable code on the local computer; connecting by the local computer with a feature computer server; identifying an instance of an installed computer program including the computer readable code, and retrieving a feature record associated with the installed computer program or the member from the feature server; and configuring a state of one or more of a set of the feature properties of the installed computer program based on a retrieved feature record. A system to perform the method is also described. | 2014-09-18 |
20140282475 | EMBEDDING PATCH LISTS WITHIN COMPILED PROGRAM CODE - Systems, methods, and other embodiments associated with maintaining information about patches installed on a node are described. In one embodiment, a method includes, in response to installing a patch to a program, updating a list of installed patches in a computer by adding an identifier of the patch to the list of installed patches. The method also includes embedding the updated list of installed patches into compiled binary code of the program. | 2014-09-18 |
20140282476 | Providing Customized Notifications for Security Software Updates - A method of providing customized software update notifications for a device is described. The method receives information for a set of available system software updates from an update server. The set of available system software updates includes a set of security updates. Each security update includes a set of metadata. The method also receives information for a set of available application software updates. The method determines the total number of available application and system software updates. The method generates a customized update notification string based on the received metadata and the total number of available software updates. The method displays the generated customized update notification string. | 2014-09-18 |
20140282477 | AUTOMATIC UPDATING OF DATA IN APPLICATION PROGRAMS - The present technology includes techniques to generate an application and to regenerate the application when updated content becomes available. While generating the application, a structured dataset can be created to store content for the application. The structured dataset can be manually or automatically edited to update the content. When the software provider is ready to update the application, the application can be regenerated in a single step of receiving the updated version of the structured dataset. | 2014-09-18 |
20140282478 | TCP SERVER BOOTLOADER - A bootloader uses a TCP server to install and verify upgrades on a networked computing device such as a storage enclosure. A data management server client may connect to a bootloader on the storage enclosure using TCP. Once the connection is established, an upgrade image (upgrade data) can be provided directly to the bootloader and installed by the bootloader at the storage enclosure. The TCP server allows for the upgrade to be installed with minimal steps and a simple interface. | 2014-09-18 |
20140282479 | METHOD AND DEVICE FOR THE MANAGEMENT OF SOFTWARE UPDATES OF A SET OF EQUIPMENT OF A SYSTEM SUCH AS AN AIRCRAFT SYSTEM - The management of software updates of a set of equipment of an aircraft system on the basis of instructions in a service bulletin, accessible in the form of commands. A command directed to at least one instruction in said service bulletin and being directed to the modification of the configuration of an item of equipment of said system is selected and executed. If the result of executing said selected command conforms to an expected result, at least one restore command allowing the reconfiguration of said equipment to its configuration preceding the execution of said command is selected. If the result of executing said selected command does not conform to an expected result, at least one previously generated restore command is executed. | 2014-09-18 |
20140282480 | Providing A Unified Update Center for Security Software Updates and Application Software Updates - A graphical user interface (GUI) for a unified software update display center is provided. The GUI includes a first display area for displaying a set of available security system software updates. The GUI includes a second display area for displaying a set of available non-security system software updates. The GUI includes a third display area for displaying a set of available application software updates. The GUI includes a single selection tool for installing all available security updates without installing any updates displayed in the second and third display areas. The GUI includes individual selection tools for installing individual updates displayed in the second and third display areas. The GUI includes a selection tool to receive further updates from a system update server and an application update server. The critical security updates are displayed with different display attributes or in different sections to distinguish them from other types of updates. | 2014-09-18 |
20140282481 | Information Processing Apparatus, Relay Server, Information Relay Method, Non-Transitory Computer-Readable Medium Storing Information Relay Program, and Communication System - An information processing apparatus includes a communication unit configure to perform communication with a specific-firmware-information transmitting apparatus and a firmware providing server through a network; and a control device configured to establish a session, between the information processing apparatus and the specific-firmware-information transmitting apparatus, according to a communication protocol enabling server push and establish a connection with the specific-firmware-information transmitting apparatus in the established session; acquire specific-firmware-information, wherein the specific-firmware-information includes at least specific-firmware location-information indicating a location of the specific firmware to update firmware of the information processing apparatus to the specific firmware; acquire the specific firmware from the firmware providing server indicated by the specific-firmware location-information, based on the specific-firmware location-information included in the acquired specific-firmware-information; and update the firmware. | 2014-09-18 |
20140282482 | DEVICE AND METHOD FOR FACILITATING SECURE COMMUNICATIONS OVER A CELLULAR NETWORK - A process for communicating utility-related data over at least one network is described. the process includes: collecting utility-related data at a hub device during a first predetermined period of time; securing the utility-related data at the hub device using digital envelopes during the first predetermined period of time; initiating by the hub device an autonomous wake up process during a second predetermined period of time; sending the secure utility-related data over a first network to a designated server via at least one User Datagram protocol (“UDP”) message during the second predetermined period of time; and receiving an acknowledgement of receipt message of the at least one UDP message from the designated server; wherein the first and second predetermined periods of time typically do not overlap, but may overlap. | 2014-09-18 |
20140282483 | Obtaining Device Drivers From an Out-of-Band Management Network - A method includes a service processor of an information handling system downloading code, including device drivers, and transferring the code to an operating system of the information handling system without rebooting the operating system. In some embodiments, a daemon of the operating system may request device drivers for newly-inserted devices and the service processor may make the device drivers available to the operating system in response to the requests. In some embodiments, the service processor may download updated device drivers and may inform the daemon. The updated device drivers may be automatically provided to the operating system or made available upon a request of a user. The service processor may make code available to the operating system by exposing a portion of its non-volatile memory to the operating system as a virtual device. | 2014-09-18 |
20140282484 | SYSTEM AND METHOD FOR REMOTELY UPDATING CABLE MODEM SOFTWARE - A telecommunication network device for implementing the DOCSIS standard during a transition from a coaxial cable network to a fiber-optic network is described. The device includes a memory including installed firmware for implementing a telecommunication gateway function in accordance with the DOCSIS telecommunication standard and a processor configured to update the installed firmware by downloading the update from a first TFTP server over a coaxial cable network, wherein the processor is further configured to update the installed firmware by downloading the update from a second TFTP server over a fiber-optic network. | 2014-09-18 |
20140282485 | SERVER, INFORMATION PROCESSING SYSTEM, AND COMPUTER PROGRAM PRODUCT - A server includes a receiver configured to receive, from an information processing apparatus that executes update, an instruction for transmitting metadata of update data used for the update; a determining unit configured to determine whether the update data includes preliminary download data, wherein the preliminary download data has an update date and time later than a current date and time, and the update date and time is a date and time from which the update becomes available; a transmitter configured to transmit, when the determining unit determines that the update data includes preliminary download data, metadata of the preliminary download data to the information processing apparatus via a communication network; and a prohibiting unit configured to prohibit transfer of the metadata of the preliminary download data on the basis of the number of information processing apparatuses that are downloading the preliminary download data. | 2014-09-18 |
20140282486 | SOFTWARE UPDATES FROM A SECURITY CONTROL UNIT - The present systems and methods relate to approaches for distributing software (such as firmware updates) in a security system that includes a control unit. The control unit may be configured to communicatively connect to a plurality of electronic devices, including sensors for the security system. The control unit may also communicatively connect to a remote server. The control unit receives firmware for target electronic devices from the remote server, determines which electronic devices are target electronic devices for which the firmware is intended, and sends the firmware to the target electronic devices. | 2014-09-18 |
20140282487 | SOFTWARE UPDATE FOR A WIRELESS COMMUNICATION DEVICE - One or more methods and systems of updating software in wireless communication devices are presented. In one embodiment, an apparatus includes a wireless air interface, a memory device, and hardware coupled to the wireless air interface and to the memory device to execute software. Upon executing the software, the hardware is to receive at least one of at least a portion of software or a parameter from a wireless communication device, receive an executable software processing package from a generation environment, executes the software processing package to reconfigure software of the wireless communication device to generate reconfigured software, and transmit the reconfigured software to the wireless communication device via the wireless air interface. | 2014-09-18 |
20140282488 | AUTOMATIC QUALITY ASSURANCE FOR SOFTWARE INSTALLERS - An approach for assuring quality of a software installer is presented. A first view of a system is recorded. The installer is executed to create installed components for an application, and subsequently, a second view of the system is recorded. Based on a recorded change between the first and second views, information about the installed components is recorded. The installation is determined to be successful or unsuccessful. If successful, selected installed components are removed. The installer is executed to reinstall the selected installed components. The reinstallation is verified. A third view of the system is recorded. An uninstaller is executed to uninstall the software application. A fourth view of the system is recorded. The uninstallation is verified. A report is generated using the first, second, third and fourth views. | 2014-09-18 |
20140282489 | Predictive System for Deploying Enterprise Applications - Predictive systems for deploying enterprise applications include memory structures that output predictions to a user. The predictive system may include an HTM structure that comprises a tree-shaped hierarchy of memory nodes, wherein each memory node has a learning and memory function, and is hierarchical in space and time that allows them to efficiently model the structure of the world. The memory nodes learn causes, predicts with probability values, and form beliefs based on the input data, where the learning algorithm stores likely sequence of patterns in the nodes. By combining memory of likely sequences with current input data, the nodes may predict the next event. The predictive system may employ an HHMM structure comprising states, wherein each state is itself an HHMM. The states of the HHMM generate sequences of observation symbols for making predictions. | 2014-09-18 |
20140282490 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM - An information processing system includes an control unit to accept input, an operating unit to execute information processing based on the input accepted by the control unit, and a registration unit to register functional information that indicates the type of function utilized by an application among a plurality of functions included in the operating unit in accordance with an electronic signature linked to the application included in the control unit. | 2014-09-18 |
20140282491 | Method, device and computer program for the automatic installation or uninstallation of software modules on equipment on board an aircraft - The automatic installation and uninstallation of software modules on equipment on an aircraft. For each reference of an obtained list of references of software modules to be installed or uninstalled, resolution rules linked to an operation associated with the software module in question are identified. The rules comprise at least one reference to an operation of installing or uninstalling at least the software module in question and a list of actions to be performed. For each reference on the obtained list, a list of references of operations to be carried out is determined depending on the obtained list and the identified resolution rules. A list of actions to be performed is determined depending on the list of references of operations to be carried out and the identified resolution rules. At least one referenced action on the list of actions to be performed is executed by calling a specific software agent. | 2014-09-18 |
20140282492 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - A processor obtains a plurality of commands executed in an installation of software on an information processing apparatus, and obtains information affected by execution of the plurality of commands in an operating environment of the information processing apparatus. The processor extracts, according to the affected information, a plurality of commands related to generation of a plurality of files or a plurality of processes that are present when the installation ends normally, and outputs the extracted commands. | 2014-09-18 |
20140282493 | SYSTEM FOR REPLICATING APPS FROM AN EXISTING DEVICE TO A NEW DEVICE - A method to recreate an application (“app”) experience on a first device on a second device, includes identifying one or more existing apps on the first device; generating a query for one or more apps matching the existing apps; sending the query to an application search engine through an application programming interface (API); searching an application search engine for one or more matching applications; and returning a set of matching apps in response to the query using the API. | 2014-09-18 |
20140282494 | CONVERSION TRACKING SYSTEM AND METHOD - Conversion tracking systems and methods are described herein. | 2014-09-18 |
20140282495 | DEPLOYING, MONITORING, AND CONTROLLING MULTIPLE COMPONENTS OF AN APPLICATION - A request to deploy a cloud-based application is received, and a unique identifier is assigned thereto. A server is selected and an agent program is installed thereon. A script queue stores a plurality of commands for the installation and configuration of the application, and the commands are sent to the agent for execution on the server, the execution of the commands causing installation and configuration of the application on the server. | 2014-09-18 |
20140282496 | TOOLS AND METHODS FOR COPYING APPLICATIONS - Various embodiments herein include at least one of systems, methods, and software to export and import an application. Some embodiments include a user selecting a source system and a target system, and automatically exporting an application from a source system and automated import of this export to the target system. Exporting an application can include testing whether a software export tool version is compatible with a software import tool version, and installing a compatible software import tool on the target system. Some embodiments include informing the user that the application has been successfully imported. | 2014-09-18 |
20140282497 | REWARDING MOBILE APP INSTALLATIONS WITHOUT A SOFTWARE DEVELOPMENT KIT IN THE MOBILE APP - In an embodiment, a method comprises transmitting, from a mobile computing device to a server computer, first data identifying a selection at the mobile computing device of an app that is not associated with an identification module associated with the server computer that would allow the server computer to identify the device; receiving, at the mobile computing device from the server computer, second data identifying zero or more apps lacking the identification module that have been selected previously using the mobile computing device; determining whether a protocol handler for each of the zero or more apps lacking the identification module is in the mobile computing device; in response to determining that a particular protocol handler for one of the apps is in the mobile computing device, transmitting to the server computer a message specifying that the particular protocol handler is in the mobile computing device; communicating a reward to any of: a particular one of the apps that is associated with the particular protocol handler, or a user account associated with the mobile computing device; wherein the method is performed by one or more computing devices. | 2014-09-18 |
20140282498 | SYSTEMS AND METHODS TO OFFLOAD HARDWARE SUPPORT USING A HYPERVISOR SUBPARTITION - In an exemplary embodiment of this disclosure, a system may include a first hypervisor, a second hypervisor, and a shared memory set. The first hypervisor and the second hypervisor run over a single logical partition. The shared memory set is accessible by both the first hypervisor and the second hypervisor, and the first hypervisor is configured to communicate with the second hypervisor by writing to the shared memory. The second hypervisor may provide support for hardware that is not supported by the first hypervisor, which hardware may be accessed by the first hypervisor through communications facilitated by use of the shared memory. | 2014-09-18 |
20140282499 | ENCAPSULATING A VIRTUAL SERVER IN A HYPERVISOR SUBPARTITION - Embodiments relate to a method for encapsulating a virtual server in a hypervisor subpartition of a single logical partition to provide additional hardware support and advanced virtualization functions. An aspect includes running a first hypervisor and one or more additional hypervisors over a single logical partition. A request to manage a virtual server is received at the first hypervisor. The request is then analyzed to determine what resources are necessary to manage the virtual server. Based on the analyzed request, one of the first hypervisor or the one or more additional hypervisors is selected to complete the request. | 2014-09-18 |
20140282500 | INSTALLATION OF VIRTUAL SERVICE PROCESSOR TO COMPUTER SYSTEM HAVING EXISTING OPERATING SYSTEM - System and method for installation of a virtual service processor (VSP) are disclosed. The system include a computer that has a processor, a physical drive having a first partition and a master boot record (MBR) with initial settings indicating the first partition as an active bootable partition, and a non-transitory computer storage medium having computer-executable instructions. The instructions cause the processor to (a) load and execute a hypervisor from the computer storage medium, the hypervisor having a privileged domain and an unprivileged domain; (b) initiate a VSP in the privileged domain, the VSP being configured to manage at least one health, operation, or performance related aspect of the computer system; (c) configure the unprivileged domain to allow an operating system to run therein, the operating system (OS) being executable directly on the computer system; and (d) load and execute the OS in the unprivileged domain. | 2014-09-18 |
20140282501 | Algorithm and Apparatus To Deploy Virtual Machine Monitor on Demand - In the various aspects, virtualization techniques may be used to improve performance and reduce the amount of power consumed by selectively enabling a hypervisor operating on a computing device during sandbox sessions. In the various aspects, a high-level operating system may allocate memory such that its intermediate physical addresses are equal to the physical addresses. When the hypervisor is disabled, the hypervisor may suspend second stage translations from intermediate physical addresses to physical addresses. During a sandbox session, the hypervisor may be enabled and resume performing second stage translations. | 2014-09-18 |
20140282502 | LAYERED VIRTUAL MACHINE INTEGRITY MONITORING - Various embodiments are generally directed to the provision and use of various hardware and software components of a computing device to monitor the state of layered virtual machine (VM) monitoring software components. An apparatus includes a first processor element; and logic to receive an indication that a first timer has reached an end of a first period of time, monitor execution of a VMM (virtual machine monitor) watcher by a second processor element, determine whether the second processor element completes execution of the VMM watcher to verify integrity of a VMM before a second timer reaches an end of a second period of time, and transmit an indication of the determination to a computing device. Other embodiments are described and claimed. | 2014-09-18 |
20140282503 | WEIGHT-BASED COLLOCATION MANAGEMENT - According to an example, an application performance measurement for an application for a current time interval, a performance specification for the application, and a resource consumption metric for a resource of a plurality of resources that are to process the application for the current time interval may be accessed. In addition, the application performance measurement, the performance specification, and the resource consumption metric may be used to determine a resource specification for a next time interval for the resource of the plurality of resources. Moreover, the resource specification may be used to determine, by a processor, a resource weight for the resource of the plurality of resources for the next time interval. | 2014-09-18 |
20140282504 | METHOD AND SYSTEM FOR SPECIFYING THE LAYOUT OF COMPUTER SYSTEM RESOURCES - A method for specifying the layout of computing system resources includes receiving a request for a virtual machine, the request comprising a processor requirement and a memory requirement, gathering resource groupings, each resource grouping comprising a latency penalty between a processor and at least a memory. The method further includes calculating a proportionality for each resource grouping, wherein the proportionality comprises a minimum of: an amount of the processor requirement the resource grouping can satisfy and an amount of the memory requirement the resource grouping can satisfy, sorting the resource groupings based on at least the proportionality for each resource grouping to create an ordered list and binding, based on the ordered list, at least one resource group to the virtual machine, wherein the at least one resource group satisfies the processor requirement and the memory requirement. | 2014-09-18 |