Patent classifications
G06F8/00
COMPILER AND PROGRAMMING SUPPORT DEVICE
A non-transitory computer readable-medium storing a compiler to cause a computer to perform processing for compiling sequence programs including a declaration of a global variable and generating an execution program to be executed by a PLC. When there is a change in a memory address in the PLC assigned to the global variable between before and after edit of a declaration of the global variable, the compiler gives an execution code to synchronize a first value stored at a memory address assigned to an unedited global variable with a second value stored at a memory address assigned to an edited global variable to an execution program corresponding to the sequence program that references the edited global variable.
BOT FACTORY ENVIRONMENT
A system for a bot factory environment is disclosed. The system may receive a graphical process model. The system may compile a bot based on the graphical process model. The system may validate the bot to generate a validated bot. The system may register the validated bot to a registry table. The system may deploy the validated bot to a runtime environment.
Optimizing pipeline execution scheduling based on commit activity trends, priority information, and attributes
A computer-implemented method includes receiving, by a computing device, an event notification; determining, by the computing device, whether to immediately execute a pipeline including a commit associated with the event notification based on historical trends of commits entering the pipeline at a similar time period as a current time; and immediately executing or delaying the execution of the pipeline, by the computing device, based on the determining whether to immediately execute the pipeline.
System and method for graphically displaying recommended mappings in an integration cloud service design time
In accordance with an embodiment, described herein is a system and method for graphically displaying recommended mappings between a source data object and a target data object in a design time of a cloud-based integration service. The system can include a recommendation engine that provides recommended mappings between the source and target data objects, so that the recommended mappings can be graphically displayed in a mapping interface. The recommended mappings can be filtered based one or more filtering criteria. Each recommended mapping can be displayed differently from an actual mapping, and can be associated with a reliability/quality indicator. A particular recommended mapping can be accepted to become an actual mapping, or to be rejected. The system allows a user to toggle between actual mappings and recommended mappings between the source and target data objects.
System and method for graphically displaying recommended mappings in an integration cloud service design time
In accordance with an embodiment, described herein is a system and method for graphically displaying recommended mappings between a source data object and a target data object in a design time of a cloud-based integration service. The system can include a recommendation engine that provides recommended mappings between the source and target data objects, so that the recommended mappings can be graphically displayed in a mapping interface. The recommended mappings can be filtered based one or more filtering criteria. Each recommended mapping can be displayed differently from an actual mapping, and can be associated with a reliability/quality indicator. A particular recommended mapping can be accepted to become an actual mapping, or to be rejected. The system allows a user to toggle between actual mappings and recommended mappings between the source and target data objects.
Security risk identification in a secure software lifecycle
A system and method for security risk identification in a secure software lifecycle. A knowledge database has a plurality of security elements which are identified for a particular software application depending on software environment and prioritized in a task list. Code vulnerabilities are identified using code scanners, with security requirements updated based on identified vulnerabilities, lack of vulnerabilities for weaknesses covered by a code scanner, potential weaknesses not adequately covered by code scanners, and software environment changes.
System and method for executing native client code in a storage device
A system and method for executing user-provided code securely on a solid state drive (SSD) to perform data processing on the SSD. In one embodiment, a user uses a security-oriented cross-compiler to compile user-provided source code for a data processing task on a host computer containing, or otherwise connected to, an SSD. The resulting binary is combined with lists of input and output file identifiers and sent to the SSD. A central processing unit (CPU) on the SSD extracts the binary and the lists of file identifiers. The CPU obtains from the host file system the addresses of storage areas in the SSD containing the data in the input files, reads the input data, executes the binary using a container, and writes the results of the data processing task back to the SSD, in areas corresponding to the output file identifiers.
System and method for executing native client code in a storage device
A system and method for executing user-provided code securely on a solid state drive (SSD) to perform data processing on the SSD. In one embodiment, a user uses a security-oriented cross-compiler to compile user-provided source code for a data processing task on a host computer containing, or otherwise connected to, an SSD. The resulting binary is combined with lists of input and output file identifiers and sent to the SSD. A central processing unit (CPU) on the SSD extracts the binary and the lists of file identifiers. The CPU obtains from the host file system the addresses of storage areas in the SSD containing the data in the input files, reads the input data, executes the binary using a container, and writes the results of the data processing task back to the SSD, in areas corresponding to the output file identifiers.
MANAGEMENT OF THE UNTRANSLATED TO TRANSLATED CODE STEERING LOGIC IN A DYNAMIC BINARY TRANSLATION BASED PROCESSOR
A processor comprising an instruction execution circuit to execute a second code stored at a second address of a memory, wherein the second code is translated from a first code stored at a first address of the memory and a translation table (TT) controller coupled to a translation table to store a TT entry comprising a mapping between the first address and the second address and an attribute field comprising an attribute value associated with execution of the second code, wherein the TT controller is to monitor execution of the second code by the instruction execution circuit and update, based on a performance metric of the execution, the attribute value of the TT entry.
MANAGEMENT OF THE UNTRANSLATED TO TRANSLATED CODE STEERING LOGIC IN A DYNAMIC BINARY TRANSLATION BASED PROCESSOR
A processor comprising an instruction execution circuit to execute a second code stored at a second address of a memory, wherein the second code is translated from a first code stored at a first address of the memory and a translation table (TT) controller coupled to a translation table to store a TT entry comprising a mapping between the first address and the second address and an attribute field comprising an attribute value associated with execution of the second code, wherein the TT controller is to monitor execution of the second code by the instruction execution circuit and update, based on a performance metric of the execution, the attribute value of the TT entry.