Patent application number | Description | Published |
20090222697 | DYNAMIC FUNCTIONAL TESTING COVERAGE BASED ON FAILURE DEPENDENCY GRAPH - A method, system and computer program product is disclosed for providing test coverage for detecting failures in a software application. The method comprises the steps of identifying a set of test cases; and for each of at least a subset of said test cases, identifying one or more of the other test cases that depend on said each of the test cases based on a defined functional relationship. The method comprises the further steps of using a selected one of said subset of test cases to test the software application; and when said test of the software application fails, then testing the software application with the one or more of the other test cases that depend on said selected one of the test cases based on said functional relationship. | 09-03-2009 |
20110314443 | SEAMLESS MIGRATION OF TUXEDO.RTM. APPLICATIONS TO A CICS.RTM. HOSTING ENVIRONMENT - Source code for a transactions on Unix® extended for distributed operation (Tuxedo®) application, is parsed by an application migration module. At least one application service routine that each specifies a Tuxedo® service within the parsed source code is identified. At least one identified application service routine includes at least one associated application-to-transaction manager (ATMI) application programming interface (API) routine. Stub code that includes an invocation call for an associated customer information control system service for each application service routine identified within the source code is generated. A customer information control system environment executable is created based upon the source code, the stub code, glue code, and a migration library. The migration library includes, for each associated ATMI API routine, a mapping routine that processes data format differences between each ATMI API routine and at least one associated customer information control system API routine. | 12-22-2011 |
20120144388 | Database Access for Native Applications in a Virtualized Environment - A database may be accessed by creating a virtualized environment on a computer system and instantiating a driver for a database within the virtualized environment. A first execution thread within the virtualized environment is created and a first unique identifier is associated with the first execution thread within the driver for the database. A first connection to the database is then opened from within the first execution thread using the first unique identifier. A first native program containing embedded structured query language (SQL) statements is executed within the first execution thread and the first native program is provided with access to said database using the first connection to said database. | 06-07-2012 |
20130007539 | METHOD FOR NATIVE PROGRAM TO INHERIT SAME TRANSACTION CONTENT WHEN INVOKED BY PRIMARY PROGRAM RUNNING IN SEPARATE ENVIRONMENT - Native applications inherit transaction contexts when invoked by primary applications running in separate hosting environments, by: receiving, by an interface of a native application server in a first hosting environment, a unique transaction context identifier for an invocation of the native application at the native application server by the primary application at a primary application server in a second hosting environment; receiving a SQL statement from the native application by the interface of the native application server; sending the SQL statement and the unique transaction context identifier to the primary application server for execution by the interface of the native application server; receiving a result of the execution of the SQL statement and the unique transaction context identifier from the primary application server by the interface of the native application server; and sending the result to the native application by the interface of the native application server. | 01-03-2013 |
20130246864 | METHOD FOR NATIVE PROGRAM TO INHERIT SAME TRANSACTION CONTEXT WHEN INVOKED BY PRIMARY PROGRAM RUNNING IN SEPARATE ENVIRONMENT - Native applications inherit transaction contexts when invoked by primary applications running in separate hosting environments, by: receiving, by an interface of a native application server in a first hosting environment, a unique transaction context identifier for an invocation of the native application at the native application server by the primary application at a primary application server in a second hosting environment; receiving a SQL statement from the native application by the interface of the native application server; sending the SQL statement and the unique transaction context identifier to the primary application server for execution by the interface of the native application server; receiving a result of the execution of the SQL statement and the unique transaction context identifier from the primary application server by the interface of the native application server; and sending the result to the native application by the interface of the native application server. | 09-19-2013 |
20150074640 | RUNTIME DETECTION OF SOFTWARE CONFIGURATIONS AND UPGRADES - The present disclosure relates generally to the field of software configuration management, and more particularly to validating, detecting, and dynamically handling software configurations and updates. A computing device detects a configuration event in a first computer program. The computing device includes a plurality of executing computer programs, wherein the plurality of executing computer programs includes the first computer program and a second computer program, and wherein the first computer program has a configurational relationship to the second computer program. The computing program determines whether the configuration event affects the second computer program. The computing device generates an action in response to the determination. | 03-12-2015 |
20150074657 | RUNTIME DETECTION OF SOFTWARE CONFIGURATIONS AND UPGRADES - The present disclosure relates generally to the field of software configuration management, and more particularly to validating, detecting, and dynamically handling software configurations and updates. A computing device detects a configuration event in a first computer program. The computing device includes a plurality of executing computer programs, wherein the plurality of executing computer programs includes the first computer program and a second computer program, and wherein the first computer program has a configurational relationship to the second computer program. The computing program determines whether the configuration event affects the second computer program. The computing device generates an action in response to the determination. | 03-12-2015 |
20150256599 | DYNAMIC TRANSACTION COORDINATION - A first computer of a distributed computing system, which is an object-oriented enterprise based application server, receives a request for a transaction. The first computer generates a unique identifier for the transaction and associates an indicator with the transaction. The indicator indicates whether coordination of transaction processing can be performed by a second computer, of the distributed computing system, that is any application server apart from an object-oriented enterprise based application server. The first computer sends the unique identifier and the indicator to the second computer which enables the second computer to participate as the coordinator for the processing of that transaction if coordination of transaction processing is permitted to be performed by the second computer. | 09-10-2015 |